Physical security
HiveWatch, the AI-driven physical security platform, announced it has appointed James Segil to its board of directors. Segil joins at a pivotal moment for the company following its recent $33 million Series B funding round, led by Anthos Capital with participation from Harmonic Growth Partners, Across Capital, and existing investors. Segil’s addition to the board brings invaluable strategic guidance from someone who disrupted a major physical security category – turn...
Interface Systems, a pioneering managed service provider delivering remote video monitoring, commercial security systems, business intelligence, and network to multi-location enterprises, outlined the security and technology trends expected to define retail, restaurant, and commercial business safety in 2026. The company anticipates an increased shift toward proactive, exterior-focused measures, AI-driven analytics for operational efficiency, broader adoption of human oversight for AI, and heig...
Verkada, a pioneer in AI-powered physical security technology, announced CapitalG is pioneering an investment at a $5.8 billion valuation - an increase of $1.3 billion since the announcement of its Series E in February. The investment will accelerate Verkada's AI capabilities and may also enable liquidity for employees, and comes as the company surpasses $1 billion in annualised bookings. AI-powered transformation "AI is fundamentally transforming how organisations protect people and places,...
Matrix, a pioneer in Security and Telecom solutions, proudly announces its prestigious recognition at the CII Design Excellence Awards 2025. This honour reinforces Matrix’s commitment to innovation-driven design and its mission to solve complex global challenges through advanced technology. The CII Design Excellence Awards celebrate outstanding contributions to design excellence across industries, recognising organisations that blend creativity, engineering, and user-centric innovation....
Matrix, a pioneer in Security and Telecom solutions, proudly announces its prestigious recognition at the CII Design Excellence Awards 2025. This honour reinforces Matrix’s commitment to innovation-driven design and its mission to solve complex global challenges through advanced technology. The CII Design Excellence Awards celebrate outstanding contributions to design excellence across industries, recognising organisations that blend creativity, engineering, and user-centric innovation....
Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more surveillance, access control, and IoT systems move into the cloud. Surveillance video, access control logs, and IoT sensor readings are among an organisation's most sensitive assets. As they are increasingly hosted in data centres around the world, questions such as where that data resides, who governs it, and how it...
News
HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organisations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink Beernink brings more than 25 years of international leadership experience in the technology and security industries to HID. His career spans sales, go-to-market and general management roles at companies including Atari, Tech Data, Samsung Electronics, Honeywell Security & Fire, Genetec and Milestone Systems (part of Canon Group). “HID is the pioneer in secure identity and access solutions, with products and technologies that touch almost every part of modern life,” said Beernink. “It’s inspiring to join a company that combines such strong innovation with a clear, forward-looking vision. HID’s scale, expertise and technology make it uniquely positioned to help customers navigate the digital transformation of access control - from mobile and cloud-connected systems to the next generation biometric authentication methods.” Educational background of Beernink Since joining HID, Beernink has been focused on strengthening HID’s European presence through closer alignment with channel partners, increased support for enterprise end-users, expansion of HID’s sales and engineering teams and continued investment in strategic growth verticals including data centres, critical infrastructure, healthcare, government and smart buildings. Beernink holds a business degree in Commercial Economics, studied Business Administration in the Netherlands, and has completed executive programs at Harvard Business School, INSEAD, and Nyenrode University, where he published a paper on strengthening boardroom preparedness for cyber risks. European leadership team Outside of work, Beernink is a licensed private pilot, dedicated runner and an active board member of his local Lions International chapter, combining his enthusiasm for technology, travel and community service. “Jos brings a wealth of experience and a truly international perspective to our European leadership team,” said Gerald Grattoni, HID’s Vice President & Head of Mature Markets. “His deep understanding of the security landscape, coupled with a strong customer-first mindset, will be instrumental in driving our continued growth and innovation across the region.”
Ambient.ai, the pioneer in Agentic Physical Security, announced the general availability of Ambient Pulsar, its most advanced AI engine yet. Built on Ambient's edge-optimized reasoning Vision-Language Model (VLM) architecture, Pulsar represents a quantum leap forward that transforms physical security from reactive response to proactive incident prevention. Physical security use cases Pulsar is engineered to reason like a human security operator, only at accelerated machine speed and scale. Trained from more than one million hours of ethically sourced enterprise video, Pulsar is the largest and most capable purpose-built vision-language model ever deployed in physical security, processing over 500,000 hours each day. It delivers frontier-model reasoning performance that exceeds OpenAI GPT-5 and Google Gemini 2.5 Pro in physical security use cases, at up to 50× higher efficiency, bringing true agentic AI to enterprise scale across thousands of cameras running 24/7. New benchmark for intelligent, autonomous security operations "With Pulsar, Ambient.ai has built what every enterprise security pioneer has been waiting for: an AI that's not just fast, but intelligent," said Cary Monbarren, Senior Director, Corporate Security at SentinelOne. "This platform is transforming how GSOCs operate, drastically reducing manual triage and response times." With this launch, Ambient.ai also introduces a suite of platform innovations, including the Agentic Video Wall, Activity Notifications, and Semantic Search, setting a new benchmark for intelligent, autonomous security operations. "Pulsar marks the beginning of a new era for physical security—one where AI doesn't just detect, but truly understands and acts," said Shikhar Shrestha, CEO and co-founder of Ambient.ai. "This release turns every camera, every sensor, and every SOC into an intelligent agent capable of reasoning, prioritising, and responding in real time." The new core of Ambient intelligence: Pulsar Pulsar is Ambient.ai's next-generation Vision Language Model (VLM)—a fully agentic, open-set model that's been purpose-built for physical security. Unlike legacy deep-learning detectors or CLIP-based analytics, Pulsar operates continuously at the edge, combining visual perception, semantic understanding, and autonomous reasoning for unmatched real-world performance. Key breakthroughs include: Always-On Edge Reasoning: By running perception at the edge, inference happens where the data originates, reducing cloud cost, latency, and bandwidth constraints. Open-Set Detection: Pulsar recognises an infinite variety of behaviours and threats, even those never explicitly trained, from unauthorised access and tailgating to emerging anomaly patterns. Contextual Intent Recognition: By fusing language and vision, Pulsar understands why something matters—distinguishing benign activity from genuine risk. Scalable Agentic Autonomy: With reasoning distributed across edge appliances, Pulsar powers multi-site environments for true real-time awareness at enterprise scale. Edge-Optimized Architecture: Pulsar's perception runs on Ambient.ai's edge appliance, an on-premises compact compute node powered by the latest NVIDIA AI infrastructure, enabling parallel inference across dozens of live video streams. Pulsar in action: The capabilities defining agentic physical security Powered by Pulsar, Ambient.ai is introducing a suite of breakthrough capabilities that chart the industry's path toward Agentic Physical Security. Launching now: Agentic Video Walls: They create a living, adaptive security operations centre, turning static feeds into a dynamic system that highlights the streams with the most interesting activity, delivering focused situational awareness. Activity Notifications: Operators define custom events or scenes using open-set, natural-language input, enabling the system to proactively deliver context-aware notifications of everyday events in real time. Semantic Search: Operators can query their video archive just by asking questions, transforming hours of footage review into instantaneous insight. Early preview: Agentic Investigations: Transforms how security teams uncover the truth. Operators can ask an outcome-oriented question—"Tell me what led to the fire?"—and Ambient.ai instantly assembles a complete incident timeline using all its tools at its disposal, including Semantic Search, Similarity Search, Licence Plate Recognition, and more. Custom Threat Assessment: Enables adaptive threat assessment through natural-language input. Security teams can dynamically calibrate alert severity to scene specific criteria. A platform built for the agentic era The Pulsar release reinforces Ambient.ai's vision of Agentic Physical Security—a new approach where intelligent systems augment human operators to prevent incidents, not just record them. The Ambient.ai platform now unifies monitoring, threat assessment, access intelligence, investigations, and response under a single AI brain. Ambient.ai's enterprise customers, including Fortune 100 pioneers in technology, finance, manufacturing, aerospace, pharma and critical infrastructure, are already realising measurable impact with as much as 95% false-alarm reduction, 80% of alerts resolved in under one minute, and millions saved annually in operational efficiency. With Pulsar as the core of the Ambient Intelligence engine, Ambient.ai is redefining what's possible in enterprise protection, creating a security system that not only understands what it sees, flagging precursors to risks to enable true prevention, but also orchestrates response and investigation autonomously to minimise potential impact. Online keynote details and registration Now at 10:00 a.m. PST, Ambient.ai will host an online keynote unveiling Pulsar in detail, including live demonstrations of each new capability.
Sielox, the established industry pioneer in intelligent layered access control and crisis event management solutions, is showcasing its latest innovations with Real Intelligence at ISC East 2025 in booth 426. Their flagship access control platform, Pinnacle, offers security teams unprecedented insights and visibility through access and event data. Featuring hundreds of user-selectable filters, Pinnacle gives operators the tools they need to not only collect valuable data, but draw operational intelligence from it. Evolving security challenges “This year at ISC East we’re highlighting how Pinnacle access control with Real Intelligence, alongside our broader portfolio of layered solutions, empowers security teams with the proactive insights they need to identify and mitigate evolving threats,” said Karen Evans, President and CEO of Sielox. “We’re looking beyond reactive security and providing proactive and pre-emptive data-driven intelligence.” Sielox will be demonstrating Pinnacle’s intuitive automated access control features, allowing visitors to experience how this access control ecosystem creates layered protection and adapts to evolving security challenges, while remaining remarkably easy to implement and manage. Certified Sielox Integrators “We continue to evolve our platforms to provide even more intuitive and secure products, and this year ISC East attendees can get a preview of the Pinnacle new UI and UX,” said Karen Evans, adding “We encourage attendees to join the end users and Certified Sielox Integrators who have guided our development with feedback and direction of their own." Variety of powerful on-premises security solutions Alongside Pinnacle, Sielox is highlighting a variety of powerful on-premises security solutions designed to make access control smarter and more efficient, including: 2700 Controller – An intelligent, secure, and fully distributed access controller supporting up to 34 doors with continuous operation even during communication interruptions. Sielox AnyWare – A web-based access control platform that lets users monitor and manage security in real time from anywhere. It supports up to 64 doors and 25,000 cardholders and allows authorised personnel to manage security events instantly from any device, anywhere. CLASS (Crisis Lockdown Alert Status System) Demo – An award-winning real-time emergency alert and response system designed to improve communication and safety during critical situations. WaveLynx Integration – A strategic partnership that enhances Sielox’s access control ecosystem with WaveLynx’s advanced Apex reader and credential technologies, including MyPass mobile credentials via Bluetooth. Professional resources and benefits Sielox is always seeking new select integrators to become Certified Sielox Integrators (CSIs) and support them with proven professional resources and benefits enabling them to provide the highest levels of secure performance, reliability, and cost-efficiency. ISC East attendees can explore these products and opportunities to provide Sielox solutions firsthand at booth 426 during ISC East 2025.
Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. These findings highlight a growing concern among faith communities about safety in shared worship spaces, and underscore the need for new approaches to help institutions create secure and welcoming environments. Key findings Additional key findings include: Safety concerns are higher at larger congregations: 32% of attendees at larger places of worship (500+ attendees) say they are very concerned about their safety, compared to 18% of those who attend smaller establishments. Younger generations feel the greatest concern: 55% of Gen Z and 61% of Millennials express safety concerns at in-person services, compared to Gen X (40%) and Boomers (25%). Younger respondents are also more likely to adjust their attendance due to safety concerns: 53% of Gen Z and Millennials say they’ve changed their habits, compared to Gen X (36%) and Boomers (14%). Security improvements are underway, but gaps remain: More than half of attendees (54%) say their place of worship has upgraded security in the past year. However, one in three (33%) still rate security measures at their institution as minimal or non-existent. At Verkada, the trend is already visible: over the past year, the number of religious institutions adopting Verkada’s security technology has increased by 65%, as more communities take proactive steps to promote safety and peace of mind for their communities. “Places of worship are essential gathering places with three in 10 U.S. adults attending religious services regularly, according to a recent Gallup Poll," said retired police lieutenant and Verkada Public Safety Advisor, Ben Jones. “For faith leaders ensuring the physical security of their congregations isn’t just about protection, but about preserving the sense of peace and belonging these spaces represent.”
SOURCE Tactical Gear, a pioneer in tactical protection, hydration systems, and modular load-carry solutions, has won the Italian Carabinieri tender for women’s ballistic vests, a significant milestone in gender-specific protection. Its female-specific vests are now widely fielded across Europe by additional police and military forces. The achievement marks a major endorsement of SOURCE’s pioneering concept of anatomically accurate female protection, now further adopted by additional European armies and law enforcement agencies. Alongside this milestone, the company introduces new ACS rapid-access pouches and ACCS Combat Clothing, designed to enhance safety, mobility, and operational performance in demanding environments. Intensive R&D and collaboration SOURCE’s female-specific ballistic vests mark a breakthrough in officer protection. Developed through intensive R&D and collaboration with dozens of active-duty female officers, the vests provide full ballistic coverage while maintaining superior ergonomics and comfort. Purpose-built for female anatomy, they are contoured to the chest, waist, hips, and shoulders, featuring shooter’s cut profiles, pressed ballistic panels, and ongoing development of contoured plates designed to eliminate fit gaps. The result is optimum protection, ventilation, and confident performance in any operational scenario, from patrols and vehicle missions to crowd control. The Carabinieri’s large-scale adoption underscores the growing European shift toward gender-specific protection solutions. Integrates ballistic protection zones The ACCS Combat Clothing line represents SOURCE’s top innovation in protective textiles. The system integrates ballistic protection zones directly into the garment’s fabric, including the neck area, to shield users from low-velocity fragmentation while maintaining full flexibility. These advanced uniforms combine flame resistance, durability, and moisture control with a lightweight, ergonomic fit, delivering both comfort and combat-grade protection. Together with external armour, it forms a complete ballistic defense solution ideal for military environments. ACCS uniforms are fielded by defense forces, including the Israel Defense Forces, reinforcing SOURCE’s position as a trusted military supplier. Advanced retention mechanisms The ACS pouches line delivers one-hand, one-action access for grenades, flash-bangs, and rifle magazines. Developed with hands-on input from military and special units, these pouches are MIL-STD-810G tested and patent-protected. The innovative design reduces draw times by up to fivefold and secures ammunition through advanced retention mechanisms that prevent accidental release. Fielded by elite units, ACS sets a new tactical standard for efficiency, reliability, and battlefield readiness. Integrating anthropometric data "Our mission is to translate user feedback into measurable operational advantages," said Dovik Gal, SOURCE Tactical Gear Marketing Manager. "By integrating anthropometric data, advanced materials, and patented technologies, we have delivered equipment that shortens reaction times, improves endurance, and increases personal safety in urban law enforcement missions."
Gunnebo Safe Storage is reinforcing its position in Europe by combining large-scale manufacturing with advanced locking technology across its full range of safe storage solutions. With specialist sites now operating as a single platform, the company has created one of the most comprehensive secure storage operations on the continent, with recent integrations being central to its success. High-security locking systems The Markersdorf facility in Germany, one of Europe’s key manufacturing sites, adds significant capacity to Gunnebo’s ability to produce its entire portfolio of products within Europe. The Primat Group in Slovenia has introduced additional scale for safe production, while WITTKOPP in Germany contributes decades of expertise in high-security locking systems. Locking technology within Europe “By bringing Primat, WITTKOPP and our Markersdorf site into a unified platform, we have connected design, manufacturing and locking technology within Europe,” said Elisabeth Whitefield, Vice President Europe, Gunnebo Safe Storage, adding “This ensures our products meet certification standards, adapt to local market needs and remain available even when global supply chains are disrupted.” Gunnebo’s European portfolio Gunnebo’s European portfolio serves financial institutions, retailers and residential customers. Operating these areas under one organisation allows the company to act as a single point of reference for customers with diverse requirements. Beyond reducing delivery times and ensuring compliance, local manufacturing provides the flexibility to tailor solutions to different markets while supporting more sustainable supply chains. Long-standing expertise in high-security mechanical locks “Our customers expect more than a safe,” said Elisabeth Whitefield, adding “They need smart, integrated solutions, backed by technical service capabilities they can rely on. Having all these capabilities in Europe means we can deliver with speed and reliability while keeping quality at the core.” Locking systems are a core element of safe storage, and Gunnebo benefits from having two specialist brands. Tecnosicurezza strengthens the portfolio with electronic solutions, while WITTKOPP contributes long-standing expertise in high-security mechanical locks. Gunnebo safe storage solutions Elisabeth Whitefield concluded: “By keeping research, development and production within Europe, Gunnebo Safe Storage can proactively anticipate and meet evolving demands. This focus strengthens our ability to adapt quickly and reinforces our position as a pioneering hub for safe storage solutions, serving institutional and residential markets with resilience and consistency.”


Expert commentary
The terrorism threat in the UK is very real. In fact, since July 2019, the threat level has never dropped lower than “substantial” or “severe.” To ensure preparedness across public places and events, the UK government has introduced the new Terrorism (Protection of Premises) Act 2025, more commonly known as Martyn’s Law in memory of Martyn Hett, a victim of the 2017 Manchester Arena bombing. Overarching aim The new legislation requires operators of public spaces and events to immediately assess and improve their readiness to respond to a terrorist attack. The overarching aim: being better prepared, protected and ready to respond should an attack occur. Everything from busy shopping centres to large stadiums must comply with Martyn’s Law by April 2027, and the Security Industry Authority (SIA) is charged with enforcing the rules. Upgraded security systems The smaller venues and events are only required to enforce low-cost solutions with no physical measures There are different rules depending on the capacity of public premises or the event, ranging from a standard-duty premises (200 – 799 people, including staff) to an enhanced-duty premise (over 800). The smaller venues and events are only required to implement low-cost solutions with no physical measures. Enhanced environments, however, must provide monitoring in and around the facility and document public protection measures. Many organisations will likely invest in upgraded security systems. However, effective responses depend not only on hardware but also on situational awareness and training, helping staff identify potential threats and respond effectively under pressure. Physical security information management systems Terror-related attacks are rare and unpredictable, and the most experienced personnel are not always on shift when something does occur. Even if they are, the most seasoned security professionals can’t ensure every decision they make is the right one. One solution gaining attention is physical security information management (PSIM) systems, which integrate siloed security tools — such as CCTV, access control and fire sensors — into a unified platform. PSIMs enable rapid information processing, automated workflows and coordinated responses to incidents, whether routine or critical. Use PSIMs to handle emergencies PSIM systems have been around for many years and have been embraced by large airports and mass transit organisations PSIM systems have been around for many years and have been embraced by large airports, mass transit organisations and critical infrastructure companies. However, these systems are ideally suited to any larger scale environment, such as those classified as an enhanced-duty premise by Martyn’s Law. For example, airports use PSIMs to handle emergencies, locate missing persons or assess potential threats like unattended luggage. Similarly, PSIMs can improve situational awareness for stadiums, shopping centres and event venues, aiding crowd management, emergency evacuations and collaboration with police or emergency services. External stakeholder intervention Should an incident require external stakeholder intervention, the PSIM becomes a mission-critical collaboration tool, enabling real-time information (including video footage) to be shared with decision-makers, emergency control rooms and first responders en route to the scene. This ensures they arrive with the appropriate resources and can deploy faster to the right places. PSIM systems also facilitate post-incident analysis, helping organisations improve protocols, demonstrate compliance and fulfil their duty of care. Impacted by terror-related tragedies Martyn’s Law aims to eliminate the complacent mindset of “it won’t happen here” when assessing the risks associated with public gatherings. Communities impacted by terror-related tragedies serve as a stark reminder that such incidents can and do occur. Within the security sector, it is crucial to promote discussions on how new approaches, technologies, and training can enhance preparedness. Equally important is the responsibility to raise awareness about Martyn’s Law and its role in fostering safer public spaces.
The sheer volume of smart locks, lock management systems, connected readers and an increasing array of Internet of Things (IoT) devices complicates the issuance and management of certificates that are foundational to establishing trust between a device and the credential used to access it. That’s why more companies are turning to PKIaaS for IoT devices. But there’s another reason to consider PKIaaS: the rise of quantum computing. Secure digital communications Gartner predicts that the pace of quantum computing will render asymmetric cryptography systems PKI certificates form the backbone of secure digital communications, but Gartner predicts that the pace of quantum computing will render asymmetric cryptography systems unsafe by 2029 and could render all current cryptography unsafe by 2034. As with any software implementation, there are pitfalls to avoid, including vendors that use proprietary technology that’s incompatible with other systems and “gotcha” pricing tactics where a slight increase in certificate usage triggers a massive increase in pricing. However, the time to implement PKIaaS is now. Physical security faces growing cyber threats Although ransomware attacks directly on computing infrastructure dominate business headlines, physical security systems are also under threat. An HID survey of over 1,200 security professionals, end-users and executives shows that 75% reported threats to their physical security systems in the past year, as these systems are more tightly integrated with company IT networks. Until recently, most physical access control systems (PACS) were proprietary and worked only on the specific systems they were designed to interact with. However, the movement toward open supervised device protocol (OSDP) revolutionised the field, allowing companies to integrate and control devices from different vendors while improving compatibility and security. PACS and IoT devices PKIaaS makes sense as the number of digital certificates needed to power PACS and IoT devices As a result, 40% of companies plan to either update or change access control systems in the next year, with 21% emphasising the need for open standards like OSDP to both improve interoperability and future-proof their systems. When asked about reasons for a proposed upgrade, more than half cited convenience, while another 40% sought to improve their overall security posture. PKIaaS makes sense as the number of digital certificates needed to power PACS and IoT devices continues to increase, promoting security and reducing manual processes related to tracking certificates. Regulatory compliance demands automation and agility Companies also face increased regulatory pressures regarding technology in general — and certificates in particular. The European Union’s Cyber Resilience Act sets mandatory cybersecurity standards for manufacturers and retailers, covering the planning, design, development and maintenance of products throughout the entire value chain. Certain high-risk products must undergo third-party evaluation by an authorised body before being approved for sale in the EU. EU Cybersecurity Act shows a unified certificate framework for ICT products, services and processes More specifically, the EU Cybersecurity Act establishes a unified certification framework for information and communications technology (ICT) products, services and processes. Businesses operating in the EU will benefit from a “certify once, recognised everywhere” approach, meaning that approved ICT offerings will be accepted across all EU member states. Given the global nature of PACS, these regulations likely will impact companies well beyond the EU, much like the general data protection regulation on websites has. These changes, when considered together with rapid advancements in quantum computing, underscore the need for a unified certification solution such as PKIaaS to handle increased — and increasingly complex — certificate compliance. A path to PKI modernisation Modernising PKI through a PKIaaS model doesn’t have to be difficult. With a clear and phased approach, most organisations can transition smoothly while reducing risk and improving efficiency. It starts with a quick assessment of current certificate usage to understand where certificates are issued, how they’re renewed and any gaps in coverage. From there, it's about defining what you need and selecting a trusted partner. Look for a solution that integrates well with your existing systems, supports automation and scales as your needs grow. In terms of partners, not all PKIaaS vendors are the same. Look for one with a strong security track record and predictable pricing, which will simplify both onboarding and long-term management. When it comes to vetting vendors, ask the following questions: Is the solution scalable? The trend toward future-proof installations has never been greater. As the number of certificates increases, any PKIaaS solution must be able to grow in concert. How will pricing change as certificate volume grows? Some solutions are priced in tiers by the number of certificates. If a company exceeds that maximum by even a single certificate, it owes not only the price difference between tiers, but it will also be expected to pay for that tier the following year, which can bring a significant financial surprise. How are CAs accessed and stored? Look for companies that can provide long-term offline secure storage of certificates that can also track when CA keys are accessed. What support is included in the PKIaaS? Specifically ask vendors about up-front costs for implementation and onboarding to get a real apples-to-apples comparison among partners. Step-by-step replacement of manual processes A pragmatic approach allows corps to move quickly and confidently from legacy PKI to a scalable Once a vendor in place, start with a focused rollout, e.g., automating certificate renewals for internal systems or a specific business unit. Once the pilot is complete, expand automation with a step-by-step replacement of manual processes to limit operational disruptions. Finally, as PKIaaS becomes embedded in day-to-day operations, it’s important to align it with broader security governance. Establishing regular reporting and clear policies, as well as future-proofing for quantum-safe cryptography to ensure long-term resilience and compliance without adding complexity. This phased, pragmatic approach allows organisations to move quickly and confidently from legacy PKI to a scalable, secure and future-ready solution. A necessary upgrade According to an analyst report, manual certificate management can cost organisations up to $2.5 million annually in labour and outage-related expenses. While automation reduces these costs by up to 65%, the real challenge in IoT environments lies in managing scale. With device lifecycles often spanning decades and certificate volumes reaching millions — especially across distributed, resource-constrained endpoints — manual PKI processes and legacy infrastructure simply can't keep up. The convergence of regulatory mandates, quantum computing threats and rising cyber risks to connected physical systems makes scalable, cloud-based PKIaaS not just a strategic advantage, but a foundational requirement for secure IoT deployments.
Physical security isn’t a one-time project or a static system. It’s a dynamic, ongoing process and program that requires constant attention and management to remain effective. While the initial implementation of a security system — what we often call Day 1 — is critical, the ongoing maintenance, service, and adjustments made after systems are operational, or Day 2, are equally essential. Security program long-term Organisations that fail to focus on post-occupancy security operations risk falling victim Organisations that fail to focus on post-occupancy security operations risk falling victim to a phenomenon known as "program drift," where systems and policies gradually deviate from their intended standards over time. To manage your security program long-term, you often need an outside perspective. By engaging a security partner to provide managed services, organisations can achieve a strategic solution for maintaining their security programs' integrity, effectiveness, and efficiency over the long term. Let’s look at the reasons why. Moving beyond Day 1 Day 1 is the milestone moment when a security system is launched — whether it’s a new system, an upgraded access control platform, or a transition to advanced surveillance technology. On this day, all components align with established policies and standards. Yet, Day 1 is only the beginning of a security program's lifecycle. What happens on Day 2 and beyond is often where the real work begins. Without a robust plan for ongoing service and maintenance, security systems can quickly fall out of compliance. Policies become outdated, configurations drift, and vulnerabilities emerge. This gradual degradation — program drift — occurs not due to neglect but as a natural result of decentralised management; competing operational priorities; and the lack of dedicated, knowledgeable resources to oversee the systems. Avoiding program drift Drift is particularly pronounced in physical security because, unlike other building systems Program drift occurs when a security program’s elements — such as access controls, camera placements, or intrusion detection settings — gradually become misaligned from their intended standards. Think of a straight line representing perfect compliance on Day 1. Over time, various factors push individual components off this line. Left unchecked, these deviations accumulate, leading to significant vulnerabilities and deferred remediation costs that would be much easier to manage and predict with a more proactive approach. Drift is particularly pronounced in physical security because, unlike other building systems such as lighting or HVAC, security measures are often viewed as inconveniences. Even when systems function as designed, features like turnstiles, visitor management, or additional access controls may face pushback for being "in the way" of daily operations. This resistance and the Day 2 problems that often result — along with the lack of centralised oversight — exacerbate the risk of misalignment and ongoing inefficiencies. Why centralised post-occupancy management matters Post-occupancy management is critical for maintaining the long-term health of a security program. Facility managers, who are often tasked with overseeing security systems, may lack the technical expertise or bandwidth to handle the complexity of modern security infrastructure. Partnering with dedicated professionals to help meet these responsibilities ensures systems are managed effectively and vulnerabilities are addressed proactively. It also helps improve system availability and uptime, accelerate break/fix response and resolution times, lower ownership costs by reducing unnecessary and repeat service dispatches, and achieve a more consistent end-user experience. Moreover, centralised management provides a consistent framework for handling security systems across multiple sites. This consistency is vital in preventing Program Drift, ensuring that local variations or individual decisions do not undermine the organisation’s overall security posture. The case for managed services Hiring outside consultants offers a proactive and professional approach to mitigating program drift Hiring outside consultants offers a proactive and professional approach to mitigating program drift. Specialised providers have the expertise, tools, and resources to manage complex security systems effectively and ensure those systems remain aligned with organisational policies and performance expectations. By acting as a dedicated external resource and interfacing regularly with your security team, your consultant can help you build, manage, and optimise a variety of services that help keep your program on track. These services range from system health and availability management (break fix); move, add change management; system configuration administration; and program/project management offices. Key benefits in the following areas Let’s look at how a managed services a partner can yield key benefits in the following areas: Standards compliance. Centralised management ensures that security systems and processes remain in compliance with established policies and standards, reducing vulnerabilities caused by ad hoc changes or decentralised management. Operational efficiency. Managed services streamline maintenance and support workflows, minimise downtime, and ensure quick issue resolution. Enhanced security resilience. Proactive monitoring and maintenance reduce the likelihood of system failures and improve overall system reliability. Standardised processes for move-add-change (MAC) activities ensure that security configurations remain consistent across locations. Cost savings. Outsourced providers help organisations optimise resources, avoid errors, and benefit from economies of scale in service delivery. Strategic focus. Outsourcing also allows internal teams to shift their focus from routine operational tasks to higher-value activities, such as strategic planning, threat analysis, and incident response. Long-term value of security investments While Day 1 success is the foundation of a comprehensive program, what happens on Day 2 determines your ability to realise the long-term value of your security investments. As the complexity of security challenges grows, pioneers must prioritise sustained management and professionalised oversight to protect their organisations, making the conversation around post-occupancy security more critical than ever. By adopting innovative strategies, implementing mature toolsets and processes, and leveraging specialised expertise, organisations can ensure their programs remain robust, aligned, and prepared to meet the challenges of tomorrow.
Security beat
Drones are poised to fill long-standing gaps in physical security. Fixed cameras leave blind spots, and human guards cannot quickly cover large or complex properties during high-risk moments. Drones fill the gaps, providing a missing mobile layer, offering unmatched speed, broad aerial visibility, and proactive coverage that elevates security from reactive to truly responsive and deterrent. As an added element in security systems, drones complement fixed cameras, access control, and licence plate recognition (LPR) systems by serving as dynamic, rapid-response assets that reach areas other technologies cannot. Integrated with existing alarms and sensors, drones can auto-launch on triggers to deliver near-instant, real-time aerial video for accurate threat verification, giving security teams critical information before taking action. Drones as first responders Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies “Drones are a natural fit for physical security because they provide teams with fast, flexible visibility that fixed cameras and human patrols cannot always deliver, especially on large properties,” says Keith Kauffman, Senior Director of DFR Strategy at Flock Safety. Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies, which includes LPR, video surveillance, and gunshot detection systems. “Drones act as a force multiplier, improving coverage without increasing head count,” says Keith Kauffman, adding “Scaling is easy with the ability for one pilot to control multiple drones stationed at multiple locations.” Drones as a force multiplier Drones reduce manpower needs by offering wide-area coverage that would normally require several guards or patrol vehicles. Drones boost security team productivity and safety by automating the most dangerous and tedious tasks, such as alarm verification. Acting as a first responder, a drone can clear a significant portion of false alarms, allowing human guards to concentrate on high-priority roles, complex issues, or confirmed intrusions with real-time aerial intelligence. This improves personnel deployment and cuts down workload, risk, and costly overtime. Drones also significantly improve efficiency and safety for security personnel, says Kauffman. A drone system delivers real-time aerial intelligence in seconds, enabling guards to respond wisely and safely. Initial threat verification Some drone systems' yearly costs are similar to a single mid-level guard's salary Some drone systems' yearly costs are similar to a single mid-level guard's salary, but they can cover up to 38 square miles. This investment provides ROI by reducing large-scale losses and allowing human guards to focus on high-touch roles, while the drone handles initial threat verification. Flock Safety entered the drone space after acquiring Aerodome DFR in October 2024, with their private-sector drone as automated security (DAS) system rolling out in Q3 2025. And because the drones plug directly into FlockOS and work alongside other tools like licence plate recognition (LPR) and gunshot detection, they can launch automatically on alerts, creating a smarter, faster response workflow. Immediate intelligence to combat false alarms Drones fundamentally change false alarm management by providing security teams with immediate, real-time aerial intelligence. When an alarm triggers, the drone can be dispatched to the exact location in seconds, allowing operators to verify instantly the threat's legitimacy via a live HD or thermal video feed. This capability enables staff to safely clear or ignore false alarms remotely, preventing guards from wasting time and resources on unnecessary, lengthy, or potentially dangerous physical checks. This process can significantly reduce alarm fatigue and allow personnel to reallocate their time to genuine security threats. Emerging drone use cases enhance security operations Emerging drone use cases enhance security operations by integrating with existing systems and enabling novel applications. One key area is Post-Storm Damage Assessment, where drones provide rapid, safe aerial visuals of expansive sites, documenting damage for insurance claims far faster than ground inspections. Another area is Ecosystem Integration via platforms such as FlockOS, where the drone automatically launches in response to alerts from other security sensors (LPR, gunshot detection). This creates a powerful, automated workflow that unifies responses, enabling quicker incident interruption, better evidence capture, and a proactive security posture without increasing the number of human patrol staff. Evolving regulations expanding drone usage Evolving FAA regulations and corporate airspace policies impact the usage of drones Evolving Federal Aviation Administration (FAA) regulations and corporate airspace policies impact the usage of drones. Today, operating drones beyond the visual line of sight (BVLOS), at night, and over-people/roadway operations requires special FAA waivers. However, the trend — Remote ID, expanded FAA Part 107 allowances, and growing BVLOS exemptions proven in drones as first responders (DFR) — reduces overhead and allows more automation. Combined with enterprise standard operating procedures (SOPs), geofencing, and data governance, drone adopters can standardise flights, minimise risk, and integrate with other technologies. “In practice, that means automated dock-based dispatch on verified alerts, scheduled perimeter sweeps, and incident-to-incident coverage without on-site pilots,” says Kauffman. “The results are faster detection-to-dispatch, stronger evidentiary chains, and lower costs per incident — unlocking 24/7 remote operations across campuses, logistics, and sites.” Winning over public acceptance Public perception plays an important role in how communities embrace drone technology, which is why transparency and clear policy are essential. When employees and community members understand the drone’s purpose — responding to alarms, patrolling after hours, and deterring crime — they tend to view it much as they do security cameras or access control: a safety tool, not surveillance. Flock’s system is event-driven, privacy-minded, and used only by authorised personnel, and every flight is logged, documented, and fully audit-traceable for accountability. “With clear communication and responsible use, drones become a reassuring layer of protection rather than a cause for concern,” says Kauffman. Drones are extremely safe, actually reducing human risk by acting as a first responder to scout ahead of personnel. They come with layers of protection, such as geofencing, obstacle avoidance, precision landing, autonomous deconfliction with aircraft, and automated safety modes. Smartest approach For security teams considering adding drones, the smartest approach is to choose a system built specifically for 24/7 security operations. That usually means the drone provider handles FAA paperwork, writes clear procedures, develops sound policy, and trains customers’ staff so everything runs smoothly. “With the right partner, drones become a safe, compliant, and incredibly helpful part of your security toolkit,” says Kauffman. Flock ramps up drone production Flock Safety’s immediate focus is ramping production of its U.S.-designed and assembled Flock Alpha hardware, which is already NDAA-compliant and built to meet the growing demand for American-made drone solutions. At the same time, the next six to 12 months will centre on releasing key software updates, such as automated scheduled patrols. Together, increased hardware production and these software advancements will move the DAS product line toward full capability and broader commercial availability. Flock DAS Flock DAS essentially provides a guard’s vantage point from above, with the ability to instantly fly to any corner of a property. “And it doesn’t sleep on duty or call in sick,” says Kauffman. “Picture your traditional security measures: cameras are your static sentries; guards are your roaming patrollers. Now add Flock DAS: it’s your mobile, flying camera that can respond anywhere, anytime.” Just as a dispatcher coordinates police calls, Flock DAS serves as an aerial dispatcher for the security team, triaging alerts and providing eyes on the scene before anyone sets foot into potential danger. It gives the security team immediate, property-wide awareness so they can make safer, more informed decisions during any incident.
Multiple technology trends are transforming the physical access control market. There is a fundamental shift away from physical cards and keys toward digital identities — mobile credentials, digital wallets, biometrics, and cloud-native access platforms. These next generation access solutions are radically reshaping how buildings operate, protect staff, and perform functionally. At the same time, AI and analytics solutions are being layered onto these physical access control systems to support predictive threat detection and behavioural insights. Access data itself is becoming an asset for sustainability, space optimisation, and smart building initiatives. Risk, impact operations and experience The annual HID Global Security and Identity Trends Report highlights these and other issues The annual HID Global Security and Identity Trends Report highlights these and other issues. The survey cites improving user convenience as a priority for nearly half of organisations, while 41% are focused on simplifying administration, and 28% struggle with system integration. These are not theoretical challenges, they are day‑to‑day friction points that add cost, increase risk, impact operations and experience, and, of course, must be addressed. HID Global’s commercial focus HID Global’s commercial focus is to help organisations digitise their access control — with mobile identities, biometrics, and cloud platforms — and then to use the data to deliver more value. “We are turning access control from an operational cost into a software-driven asset that improves efficiency, supports Environmental, Social, and Governance (ESG) goals and even creates new revenue opportunities,” says Steven Commander, HID Global’s Head of Consultant Relations. The impact of digital transformation Digital transformation is the method of moving access control from hardware and physical credentials Digital transformation is in the process of moving access control from hardware and physical credentials to a software-driven, integrated experience. The transformation strengthens security while also improving user convenience — transforming the “pavement to the desk” journey. HID enables this shift through mobile credentials, biometrics, cloud-native platforms, and solutions that allow third-party applications to run on door hardware. “This helps customers turn access data into operational and commercial outcomes, while also improving the overall user experience,” says Commander. Digital transformation in access control is not focused on chasing the latest trends. Rather, transformation is about turning software, data and integration into outcomes that matter to customers, says HID. “Security becomes stronger and more adaptive,” says Commander. “Operations become simpler and more cost‑effective. Experiences become seamless and consistent. Sustainability moves from ambition to action. And the financial case becomes clearer as efficiencies are banked and new value streams emerge.” The challenge of futureproofing with long lifecycles Given that physical security technologies will be in place for 15 to 20 years, it is important to plan for how systems can evolve over time. Considering how rapidly security threats, compliance standards, and user expectations change, 15 to 20 years is a long time. The decisions made at the beginning of a system’s lifecycle can either limit flexibility later (which will be costly) or enable long-term adaptability. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important Choosing products and platforms that are open, interoperable, and designed for updates can enable future-proof projects. Support for open standards such as Open Supervised Device Protocol (OSDP) is therefore important. In addition, systems built on open controller platforms — such as Mercury — enable organisations to switch software providers or expand functionality without replacing core door hardware. Architectural openness is key to system lifecycles and maximising the return on investment (ROI) from a chosen solution. Digital credentials and mobile access Flexibility and upgradeability should also be top of mind when it comes to endpoints like access control readers. While RFID cards are still commonplace, there is a clear trend toward digital credentials and mobile access. Readers that support both allow organisations to transition at their own pace, without committing to a full system overhaul. A long system lifecycle does not mean technology should remain static. Security, particularly cybersecurity, demands more frequent updates. Technologies that support firmware upgrades in the field extend the value of a deployment while helping organisations keep pace with emerging threats. In that sense, lifecycle thinking is not just about longevity — it’s about maintaining resilience and readiness over time. Applying biometrics and mobile identities Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction Biometrics is becoming mainstream as a credential alternative, strengthening security without adding friction. Many organisations are now deploying biometrics to support fast, seamless access journeys, with adoption already around 39% in access control according to HID’s recent research. In addition, 80% of organisations surveyed expect to deploy mobile identities within the next five years. Full technology integration enables tap‑to‑access without opening an app; the user journey becomes faster, safer, and more convenient. “It is where the industry is headed and we are at the vanguard of this,” says Commander. Ongoing challenge of cybersecurity At HID Global, cybersecurity is embedded into everything, from corporate processes and development practices to the solutions they bring to market. “Our approach ensures that customers can strengthen their overall security posture, not only by deploying secure products but by benefitting from HID’s commitment to the highest industry standards,” says Commander. HID holds multiple globally recognised certifications, including ISO 27001, ISO 14298, SOC Type 2 and CSA STAR, which demonstrate their robust information security and cloud security practices. In addition, HID’s SEOS® secure chipset is independently SEAL-certified, providing one of the most advanced levels of protection available on the market today. “Ultimately, this means organisations are not just purchasing isolated secure products; they are implementing solutions developed and delivered within a comprehensive, cybersecure framework,” says Commander. “When deployed according to best practices, HID solutions enable customers to achieve the highest levels of resilience against evolving physical and cyber threats.” Developing green and sustainable solutions A huge amount of waste is generated from the manufacture of plastic RFID access cards Digital credentials align with the sustainable solutions that everyone wants. A huge amount of waste is generated from the manufacture of plastic RFID access cards. Over 550 million access cards are sold annually. This creates 2,700 tons of plastic waste and 11,400 tons of carbon, based on a PVC card weighing 5 grams. Therefore, digital credentials self-evidently reduce the reliance on plastic cards (helping reduce carbon emissions by up to 75% according to HID’s research), while leveraging access control system data supports energy optimisation by shutting down or reducing systems in unused spaces. Energy use and CO₂ emissions can be cut dramatically, showing how access systems can contribute to sustainability goals and green building certification. What is the latest in smart buildings? Smart buildings increasingly rely on mobile access control as the backbone for digital services. Real-time access data enables new services such as automated room bookings, HVAC control, lift/elevator calling, e-bike hiring, and so on. Smart buildings increasingly rely on mobile access control as the backbone for digital services The financial upside is clear; smart, digitally transformed buildings can deliver around 8% higher yields per square foot versus traditional office space. Operational savings accrue from reduced administration, the removal of card production and shipping, and lighter IT support. This creates a value cycle — better experiences drive adoption, adoption fuels monetisation, and monetisation funds further improvements. Achieving technology impact in the real world One standout project is One Bangkok – a $3.9 billion mixed used development in Thailand – which demonstrates the scale of what can be achieved when access control data is used for optimisation, particularly when it comes to monitoring facilities usage and occupier behaviours. By switching lights off or lowering the temperature in unused rooms, for example, the One Bangkok building demonstrates this potential with a 22% reduction in energy consumption, saving 17,000 MWh and 9,000 tons of CO₂ annually. Sustainability is a key factor in contributing to how properties are valued. And sustainability extends far beyond digital credentials having a lower environmental impact than plastic cards. Buildings with recognised sustainability certifications often command rental premiums of around 6%, and three‑quarters of security decision‑makers now consider environmental impact in their procurement assessments.
The speed, scale and sophistication of today's safety threats can outpace human capacity to keep up. The implementation of artificial intelligence (AI) is essential to keep people safer and must be designed and deployed transparently. The complexity of today’s AI applications is expanding in physical security, with more AI models leveraging data to tune performance and using third-party application programming interfaces (APIs). In this context, it can be difficult to find clear, consolidated, transparent information about AI’s use in enterprise security technologies. How AI is used across the company’s technologies Motorola Solutions is taking a layered approach to help users easily understand how AI is used Motorola Solutions is taking a layered approach to help users easily understand how AI is used across the company’s technologies, starting at a high level with AI labels affixed to products, and getting more granular with structured information about AI testing, assessments and more. “We are aiming to provide clarity to the user and those they help protect to increase trust and transparency in AI innovation,” says Hamish Dobson, Corporate Vice President, Avigilon and Pelco Products, Motorola Solutions. Importance of AI transparency The AI labels, which have been compared to nutrition labels used on consumer products, are designed to be clear and easy-to-read at a glance. Each label explains the type of AI used, who owns the data processed, human controls, and the purpose behind the product’s specific application of AI. AI labels are comparable to nutrition labels used on consumer products. “We regularly seek input from external stakeholders – including customers, partners, consultants, investors, policymakers, and community members – on many aspects of our business,” says Dobson. “We briefed select customers and industry groups on our AI labels initiative and received positive feedback.” He continues: “Like us, customers and industry groups understand the importance of AI transparency and are looking for ways to clarify AI usage in public safety and enterprise security.” AI transparency efforts AI transparency efforts have taken on a variety of forms such as model cards, transparency notes Across industry, AI transparency efforts have taken on a variety of forms such as model cards, transparency notes and, in Motorola’s case, AI labels. The company pledges to continue to engage with industry participants on efforts to advance the overall pace, adoption, and maturity of responsible innovation initiatives across the industry, says Dobson. The AI labels help to increase dialogue and understanding of AI’s use in the security technologies that help to keep people safer. Motorola Solutions is looking to inform customers about how AI is being used to automate mundane tasks and prioritise information that may be critical to performing their roles. Motorola’s L6Q licence plate recognition For example, a business using Motorola’s L6Q licence plate recognition camera in its parking lot could view the AI label and see that AI is used to help recognise licence plate characteristics of vehicles within its view. The label would also help the customer understand that they maintain ownership and control of the data AI can process and can determine the data retention period. The label would also help the customer understand that they maintain ownership. What type of AI is being used AI outputs should have human oversight, and a user should understand the sources of data “By providing knowledge of where and what type of AI is being used, our customers can better understand what they are deploying, configure settings appropriately and inform their constituents,” says Dobson. AI-assisted experiences should be designed to be accountable and transparent, according to Motorola Solutions. AI outputs should have human oversight, and a user should understand the sources of data from which suggestions were drawn. AI labels highlight that the data AI can access is customer-owned and controlled, helping to increase confidence that AI outputs are based on that customer's specific data. Responsible and ethical use of technologies The AI label’s “first or third party model” section explains the source of the AI model. A first-party model is developed in-house by Motorola Solutions. A third-party model is developed outside of Motorola Solutions and made available by a third-party vendor; however, it may be customised by Motorola Solutions. MTAC is a multidisciplinary group that advises the company on the reliable and ethical use of technologies “This section aims to foster dialogue with our customers around Motorola Solutions’ role in testing, training, and refining the AI model or models used in our products,” says Dobson. Helping to propel the AI Label initiative, the Motorola Solutions Technology Advisory Committee (MTAC) is a multidisciplinary group that advises the company on the responsible and ethical use of technologies, including data and AI. Industry trends in technology’s responsible design MTAC continuously explores new ways to enhance trust with customers and the communities they serve, while helping to keep Motorola Solutions a step ahead of industry trends in technology’s responsible design, development, and use, according to the company. The MTAC “Blueprint” sets out the core principles that drive the approach. “We’re excited by the opportunity to continue to lead in this area through additional innovation, thought leadership, and stakeholder engagement,” says Dobson. Human-centered design New capabilities specifically augment human skills and capacity with the goal of helping humans Rather than replacing human decision-making, AI technologies will, in fact, augment it. Human-centered design is a core principle of the responsible technology “Blueprint” Motorola Solutions is developing. New capabilities specifically augment human skills and capacity with the goal of helping humans spend time on what matters most during a safety or security incident, applying their unique judgement, knowledge, and oversight in high-stakes environments. AI’s recommendations “We purposefully deploy AI to augment human focus, effort and performance,” says Dobson. “We design AI to maximise human strengths like judgement and reasoning and to adapt to changing roles, tasks, risk levels, and cognitive states while keeping AI outputs traceable and transparent, whereby the user can easily see, check and override AI’s recommendations.”
Case studies
Xtract One Technologies announced its SmartGateway has been selected by Nova Scotia Health to strengthen security measures and provide AI-powered weapons detection across facilities province-wide, with an initial order of 25 systems. Nova Scotia Health, in tandem with its nurses’ union, is working to modernise and strengthen security across its facilities to ensure a safe environment for all patients, visitors, and staff. Adopting and deploying advanced technologies like SmartGateway is an important step toward achieving that goal. Safe and secure health care By helping to limit the number of potentially dangerous items entering their hospitals, this technology supports its commitment to providing safe and secure health care. Xtract One was selected for its proven efficacy to accurately detect knives, a top priority for the organisation. Previously tested in Truro, Nova Scotia, over a 12-day trial period, SmartGateway successfully scanned 7,400 individuals entering the facility and detected 49 prohibited items during that period, mostly pocket knives and box cutters. Deploying SmartGateway “Violence against healthcare workers is a challenge that persists and demands addressing. By deploying SmartGateway, Nova Scotia Health is setting an important example for what it means to take meaningful action to protect frontline healthcare workers, patients, and visitors,” said Peter Evans, CEO of Xtract One. “This installation marks another key step in our expanding work with Canadian healthcare organisations, having deployed in Manitoba earlier this year. We look forward to continuing to deliver effective threat detection as more providers take proactive measures to prioritise security and peace of mind for their teams.” Overall approach to security “Our goal is to deliver first class healthcare, and ensuring the safety of all who enter our facilities is a critical step in providing that service,” said Dean Stienburg, Director of Security for Nova Scotia Health. “With SmartGateway, we’re making tangible strides in bolstering our overall approach to security. We were impressed by the system’s effectiveness during the trial period and are looking forward to the deployment helping us mitigate and respond to the threats of today’s environment.” Maximising security screening outcomes SmartGateway delivers fast, discreet, and accurate individual screening, utilising AI-powered sensors to unobtrusively scan for weapons and other prohibited items upon entry. This technology replaces intimidating, traditional metal detectors and mitigates the need for individuals to remove personal items. This prioritises individual privacy and comfort, all while maximising security screening outcomes. SmartGateway is designed to enable seamless passage through checkpoints and promote the uninterrupted flow of movement.
Set in 33 hectares of woodland on the edge of Dartmoor National Park, the zoo is home to an impressive variety of exotic and native animals, including Amur tigers, African lions, and Amur leopards. New patented master key system On-site challenges before the introduction of the new patented master key system. Before implementing the new master key system, the zoo faced the challenge of ensuring secure and efficient access control to sensitive areas, particularly enclosures with potentially dangerous animals. The previous master key systems were outdated and did not provide the necessary security and flexibility required for the zoo's daily operations. Installation of EPS NP and its advantages The EVVA EPS NP system was installed in collaboration with local partner Sir Fix-a-Lock. This system offers robust patent protection, long-term key control and high reliability in demanding environments. A total of 192 Asec weatherproof padlocks were installed in a 6-level master key system. The flexibility of EPS NP enabled graduated key control across the entire site, including special levels for animal care. Advantages of the new patented key system for the zoo Thanks to the new master key system, the zoo has been able to implement a secure and practical solution that enables staff to work efficiently while maintaining strict access controls. The colour-coded keys make it easy to quickly identify access authorisations, which is particularly advantageous in security-critical areas. The Asec weatherproof padlocks also offer high resistance to environmental influences, ensuring the longevity of the system. "EPS has revolutionised our access control and gives us the security and flexibility we need." The project at Dartmoor Zoo impressively demonstrates how EVVA's flexible master key systems can be adapted to specific requirements to ensure security, control and long-term protection.
Crime analysts at DeterTech, a trusted security partner to critical infrastructure and law enforcement, are warning of a major rise in reported incidents of copper and cable theft across Greater Manchester and Lancashire. Believed to be orchestrated by Organised Crime Groups (OCGs), the direct to threat to UK infrastructure is being driven by the sustained high price of copper, which hit $10,300 per tonne on 25th September 2025 – the highest recorded price since April 2024. Cable theft from rail network Cable theft from the rail network in Wigan resulted in widespread passenger disruption There have been six key incidents reported in the North-West of England since 14th September, impacting energy, transport, utilities and renewables infrastructure. For example, in Bolton a site was targeted for 33 kv copper cable valued at just under £500,000. Meanwhile, the theft of a significant quantity of string cable from a solar farm near Preston reduced the site’s energy output by around 40% risking the local power supply. Back in August, cable theft from the rail network in Wigan resulted in widespread passenger disruption and estimated losses to the UK economy of more than £1million. Deal with the threats Rachael Oakley, Head of Crime Intelligence, DeterTech, says: "The substantial price of copper is unfortunately driving high rates of offending across all forms of critical infrastructure. In order to protect energy, utilities, transport, and renewable infrastructure, it is imperative that fence lines are checked regularly, CCTV cameras are functioning correctly, and alarm monitoring centres are correctly equipped to deal with the threats posed." Critical infrastructure providers, particularly those with sites in the North-West of the UK, are urged to audit site security plans and to consider taking additional steps to deter unwanted attention from OCGs. Direct threat to infrastructure The current intelligence picture points toward an on-going direct threat to infrastructure, with implications for asset loss service disruption, regulatory penalties and public safety. Operators are reminded to continue reporting all incidents of theft, suspicious vehicles, and hostile reconnaissance to DeterTech and Opal, the national police intelligence unit focused on serious organised acquisitive crime.
Rhombus, a pioneer in cloud-managed physical security solutions, announced the launch of Rhombus Insights, an AI-powered solution that empowers businesses to measure virtually anything their cameras can see and automate responses based on those specific observations. The launch is a significant expansion of Rhombus’ AI analytics capabilities, giving organisations complete customisation over what they track and how they respond to operational situations. Rhombus's physical operations Businesses can now create tailored measures and automatic replies designed for their specific active needs Rhombus Insights addresses a fundamental challenge companies have faced: the inability to answer questions about their physical operations without ongoing and time-intensive human intervention. Whether tracking parking availability, observing equipment placement, verifying safety protocols, or measuring inventory levels, businesses can now create tailored measurements and automated responses designed for their specific operational needs. How businesses continually optimise and secure “Companies have been limited to predefined analytics that couldn’t really address what they need to know about what’s going on at their store, their campus, their factory, or other physical space at any given moment,” said Rickey Cox, VP of Product at Rhombus. “Rhombus Insights changes that completely. If your Rhombus cameras can see it, you can now measure it, track it, and automate responses to it. This level of complete customisation unlocks entirely new possibilities for how businesses continually optimise and secure their physical spaces.” Transforming visual data into actionable intelligence Rhombus Insights works through an intuitive setup process where users simply create prompts Rhombus Insights works through an intuitive setup process where users simply create prompts describing what they want to measure, specify the measurement type (numerical, percentage, or true/false), and set monitoring frequency. The solution then continuously analyses camera footage to provide real-time data visualisation, exportable reports, and API access for integration with existing business systems. Instant alerts and automated actions Going beyond passive monitoring, Rhombus Insights enables organisations to configure instant alerts and automated actions whenever specific conditions are met. When triggers are detected, the system can send notifications via email, text, or push notification, and execute custom actions such as playing audio announcements or activating third-party devices (such as lights or alarms) through relay triggers. Cross-industry applications drive operational excellence Educational clubs can verify safety protocol compliance, such as confirming lifeguard presence The flexibility of Rhombus Insights supports diverse use cases across industries. In manufacturing environments, companies can track forklift counts on warehouse floors and automate safety alerts when equipment exceeds safe density levels. Retail businesses can observe queue lengths and automatically notify staff when customer wait times become problematic. Educational institutions can verify safety protocol compliance, such as confirming lifeguard presence at pool facilities. Operational leverage and increased efficiency “Like many businesses, our operations have unique characteristics that require specialised knowledge and measurement capabilities,” said Kevin Bush, Chief Strategy Officer at Fresh Dining Concepts, the largest franchisee group of brands like Cinnabon and Auntie Anne’s. “Being able to use our cameras to extract actionable information and automate business response gives us an incredible amount of operational leverage and increased efficiency across our locations.” Seamless integration with existing infrastructure Rhombus’ strategic growth of purposeful AI features built into its cloud-based physical security system Rhombus Insights works with existing Rhombus camera infrastructure or 3rd party cameras and integrates seamlessly with the company’s unified Rhombus Console. Organisations can configure their choice of large language model (LLM) to power the AI analytics, with options including Rhombus’ provided solution or integration with pioneering AI platforms such as ChatGPT, Claude, Gemini, and Grok. This launch continues Rhombus’ strategic expansion of purposeful AI features built into its cloud-based physical security system, following recent introductions of natural language video search and operational analytics capabilities that include line crossing and occupancy counting. Driving cost efficiency and strategic decision-making By automating previously manual monitoring processes, Rhombus Insights delivers significant cost savings while providing organisations with data-driven insights that influence site planning, budget allocation, and operational strategy. The solution's automated response capabilities ensure critical conditions are addressed immediately without requiring constant human oversight. Availability Rhombus Insights is now available to companies with existing Rhombus deployments. Organisations interested in exploring how AI-powered custom analytics and response triggers can optimise their physical spaces
DeterTech, a pioneer in intruder detection and site security, is proud to announce its involvement with the latest series of DIY SOS: The Big Build Ireland, with the next episode due to air on Sunday 5th October on RTÉ One. One episode this series focuses on a life-changing project in Killinarden, Tallaght to adapt the home of nine-year-old Cayden and his family into a safe and accessible space that is tailored to their needs. Cayden was born with Arthrogryposis and is fully dependent on a wheelchair. The DIY SOS team stepped in after learning he was largely confined to the living room and needed to be carried upstairs, to and from his bedroom and to the toilet affecting his and his family’s qualities of life. Seeing so many volunteer tradespeople and suppliers come together to transform the terraced house was a truly special moment and makes for a spectacular reveal. DeterTech volunteers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers – from builders and electricians through to landscapers and gardeners. DeterTech also supplied the site security solutions necessary to protect people, tools and materials throughout the build. Speaking about the project Michael Kennedy, CFO, DeterTech, says: “We pride ourselves on bringing greater peace of mind to people and communities every day. Being there on reveal day to see the reaction is something I’ll never forget. I’d like to pay huge thanks to the entire DIY SOS family for involving us, and to all the volunteers, suppliers and organisers who worked so hard to create a better future for Cayden and his family.” DeterTech on board Helena Ryan, Managing Director Cooga Safety Services Group and Safety Supervisor for DIY SOS: The Big Build Ireland, adds: “One of the builds that features this series had 1,346 people on site, all of whom benefitted from the services DeterTech provides. DeterTech went above and beyond, did phenomenal work and I look forward to collaborating again in the future.” Orlagh Murphy of indiepics, the production company behind the show, concludes: “Having DeterTech on board has been a game-changer for our site safety and security. It gives our crew, contractors and volunteers the confidence they need to press on and transform the homes of our very deserving recipients.”
Boon Edam Inc., a global pioneer in physical security entrance products, is excited to share that American University in Washington, D.C., has completed the installation of five Lifeline Speedlane Compact turnstiles and one Winglock Swing Gate as part of a comprehensive renovation of its Terrace Dining Room (TDR), the university’s main dining hall serving thousands of students, faculty, and staff each day. Improved systems Manual point-of-sale card swipes slowed entry, resulted in higher-than-normal error rates At a university where thousands of students move through campus each day, the entrance to the Terrace Dining Room had become a frequent source of crowding and delays. Long lines routinely snaked up the stairs from the entryway during peak meal times, frustrating community members. Manual point-of-sale card swipes slowed entry, resulted in higher-than-normal error rates, and created demand-based planning challenges. With improved systems, staff can prioritise exceptional guest service rather than managing long lines. Seamless integration Seamless integration with the campus meal plan transaction system eases congestion Seamless integration with the campus meal plan transaction system eases congestion, allowing for more meaningful guest interactions. Additionally, real-time data on guest traffic enables better staffing and demand forecasting, ensuring the right team is in place to elevate the overall experience. The university needed a more intelligent, streamlined solution that could improve flow, enable better planning, and support a better dining experience for its students, faculty, staff, and guests. Comprehensive transformation As part of a comprehensive transformation of the TDR, American University (AU) selected Boon Edam’s Lifeline Speedlane Compact turnstiles to deliver a secure, modern access solution that aligned with the dining hall’s upgraded design and high traffic demands. From the earliest planning phases, access management and control were a top priority. Working closely with the university’s OneCard, auxiliary services technology, and planning and project management teams, Chartwells Higher Education, and the Atrium Campus support team, Boon Edam provided a solution that met the university’s vision for fast, intuitive, and secure student entry. Students now tap their AU OneCard to gain immediate access with real-time verification of meal plan status and account balances. The system has been fully integrated with the Atrium Campus meal plan system, delivering a seamless user experience. Speedlane design The system enables seamless movement, improving security and meal plan integrity Boon Edam’s sleek, low-profile Speedlane design complements the architectural aesthetic of the new space, while advanced security measures ensure only authorised users gain entry. The system enables seamless movement, improving security and meal plan integrity without creating a restrictive feel. “This was a strategic effort to blend security, efficiency, and design,” said Michael LoBasso, Associate Director of Auxiliaries Technology at American University. “It was a true collaboration with Boon Edam, Chartwells, our campus partners, and Atrium Campus to create a dining experience that’s secure, smart, and seamless.” Enhanced efficiency With thousands of students passing through the Terrace Dining Room during peak hours, American University needed a solution that could keep pace with real-world campus demand. Boon Edam’s Lifeline Speedlane Compact turnstiles delivered, combining bi-directional access control, intuitive LED guidance, and fast user identification to eliminate bottlenecks and maintain steady throughput during the day. Two Speedlane Compacts serve as dedicated entrances, three more manage exit flow, and a Winglock Swing gate provides additional flexibility for deliveries and large group access. Operational oversight This layout enables smooth, consistent movement in and out of the facility, freeing staff from manual enforcement and allowing them to focus on service and hospitality. The system has proven reliable under pressure, handling volume efficiently while supporting the university’s goals around student satisfaction and operational oversight. Accessibility and modernisation The new layout supports smoother traffic flow, more inclusive dining options The renovation of the Terrace Dining Room was more than a visual upgrade. It was an investment in the student experience, operational efficiency, and forward-thinking design. The new layout supports smoother traffic flow, more inclusive dining options, and a welcoming space where students can gather, recharge, and connect. American University’s focus was on accessibility and modernisation, and Boon Edam’s Speedlane Compact turnstiles contributed meaningfully to that vision. They helped to improve secure access with low energy consumption and a minimal operational footprint. The result is an access solution that fits seamlessly into a high-volume environment while aligning with long-term sustainability goals.


Round table discussion
Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving large numbers of people and critical goods across vast, often interconnected infrastructure, it presents a highly attractive target for various threats. More threats equate to a greater need for security. We asked our Expert Panel Roundtable: What are the emerging applications of physical security in the transportation market?
Installing physical security systems requires integrating diverse technologies (e.g., cameras, access control, alarms) that often use different protocols and must be adapted to a building's unique physical layout and legacy infrastructure. Specialised technical expertise is required for seamless networking and proper configuration. Hopefully, no important factors are overlooked in the installation process. We asked our Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
The healthcare industry faces unique and significant security challenges. Healthcare security professionals must balance an open, welcoming environment for patients and visitors with the need to protect valuable assets and personnel in a high-stress, 24/7 setting. These requirements direct the physical security technologies deployed in medical facilities. We asked our Expert Panel Roundtable: What are the unique aspects of the healthcare market, and how should the physical security industry adapt?
Products


White papers
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download
Maximising enterprise security systems in the cloud
Download
The power of integration in physical security systems
Download
Preventing loss, securing assets
Download
Using artificial intelligence (AI) to automate physical security systems
Download
Integrating IT & physical security teams
Download
Verkada workplace safety survey
Download
How to create a successful physical security roadmap
Download
5 easy steps to an upgraded video surveillance system
Download
Improving city mobility using connected video technology
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Unified physical security
Download
Integrated access control: reap the benefits of connected security
Download

Videos
Physical security: Manufacturers & Suppliers
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
