Wireless security
The steute business division - Controltec has expanded its range of wireless foot switches to include a variant developed specifically for heavy-duty applications such as welding stations. In such applications, wireless foot switches really make sense because the lifetime of cabled foot switches can be limited due to weld spatter damaging the cables. And during normal work processes, the cables can also be a tripping hazard. Robust and extremely enlarged protective shield Conventional foot sw...
AlarMax is pleased to announce the promotion of Matt Ehrman to Senior Vice President, Supply Chain, reflecting the company’s commitment to building a world-class supply chain infrastructure to support its dealers, branches, and vendor partners nationwide. Ehrman brings decades of experience across security, distribution, and retail channels, with a reputation for forging high-impact supplier relationships and creating smarter, more responsive systems for inventory and fulfillmen...
Hochiki Europe has released highlights from its 2025 Customer Survey, with respondents reporting consistently high satisfaction in the areas that matter most to specifiers, installers and facilities teams. Customers praised the experience delivered by Hochiki’s people, friendliness, helpfulness and product knowledge, alongside product fundamentals such as high quality and reliable performance that helps reduce false alarms. Service delivery also strengthened versus last year. Respondents...
Alfred International, a pioneer in smart lock solutions, will make its debut at GSX 2025 in the First Time Exhibitor Pavilion, Booth #3406, showcasing innovative access control solutions designed specifically for commercial, multi-family, and rental property markets. The company will highlight its expanding portfolio of professional-grade smart locks, led by the new DB1 Pro Smart Deadbolt and the industry-first Interconnect Kit. Key highlights DB1 Pro Smart Deadbolt: Alfred's most adv...
SimpliSafe®, maker of award-winning smart home security systems, announced the SimpliSafe® Smoke & Carbon Monoxide (CO) Alarm Listener, an innovative device that enables customers to integrate their current smoke and CO detectors with SimpliSafe's connected system and 24/7 professional monitoring for fire and carbon monoxide hazards. The Alarm Listener works with existing detectors to trigger the SimpliSafe System when there's smoke or CO danger, providing an added layer of pro...
The latest edition of Assa Abloy’s long-running Wireless Access Control Report has just been published, and the 2025 report paints a picture of a maturing market where digital and mobile solutions are becoming the norm. With strong momentum behind trends such as wireless adoption, sustainability, and cloud services, the focus now turns to increasingly intelligent integrations and to demonstrating ROI to cement access control's role in a new generation of smart, secure, and efficient build...
News
Wireless CCTV (WCCTV), the USA’s major manufacturer and supplier of all-in-one mobile surveillance cameras and solar surveillance trailers, has announced that its Executive Vice President, Adam Haworth, has been nominated by his peers and recognised as a Security Innovator honoree for the 2025 Security Innovator Awards, due to his ongoing strategic approach to redefining how surveillance systems are sold and deployed. Security Innovator Awards Hosted by SecurityInfoWatch and in collaboration with Security Business Magazine and Security Technology Executive, the Security Innovator Awards are designed to recognise the innovative contributions made by individuals within the security industry, making them unique as the industry’s only 100% peer-nominated programme. The Awards highlight each honoree as an expert in their field by making an innovative contribution to the development of solutions, businesses, and the wider industry. “The Security Innovator Awards emphasise industry innovation and reward those individuals who actively demonstrated an outstanding level of excellence,” explains SecurityInfoWatch Editorial Director Steve Lasky. Mobile surveillance Adam has built a career spanning more than two decades, advancing mobile surveillance Having recently celebrated his 22nd anniversary at WCCTV, Adam has built a career spanning more than two decades, advancing mobile surveillance and wireless security solutions while bringing his sales expertise to the forefront of his role as Executive Vice President. During his tenure as EVP, he has transformed the way mobile security systems are sold and deployed by redefining them as capital purchases and rental solutions. This approach enables WCCTV to provide flexibility to its customers and scale security coverage as necessary. Adam has been a key player in shaping WCCTV into a market pioneer within the mobile video surveillance industry, providing tools that meet real-world demands for businesses across a range of sectors. Future of security The Security Innovator award highlights the measurable impact through Adam’s pioneering, spotlighting his forward-thinking and emphasizing the innovation to change the future of security, and the importance of bringing tangible ideas to the board to elevate the business's functions and broaden its operations. “It’s a privilege to be recognised as one of the industry’s best innovators by my peers, and it truly speaks to the strength of WCCTV’s culture, paired with the ability to grow through innovation,” commented Adam Haworth, Executive Vice President of WCCTV. Mobile video surveillance supplier “Each individual within the business has contributed towards the company’s success, and nothing would be possible without committing to constantly generating fresh ideas and remaining the leading mobile video surveillance supplier." “It’s crucial to constantly keep the future of the industry in mind when making decisions, as customers’ expectations are becoming increasingly demanding, and we need to be evolving with them,” concluded Adam Haworth. This award highlights the rapid-paced evolution of the surveillance and security industry, ensuring each individual is separated from their company and making a measurable impact through their own pioneering.
Intelligent power management company - Eaton has launched the new Scantronic Secure Radio (SSR) Range, designed to make wireless intruder alarm systems faster to install, easier to upgrade and more tamper-proof. With over 50 years of security expertise, Eaton’s new SSR Range addresses the growing demand for flexible and secure systems. Traditional hard-wired set-ups The range combines fast structure, encrypted two-way touch and built-in cloud connectivity to secure buildings These can be deployed quickly for both residential and commercial use, without the disruption and limitations associated with traditional hard-wired set-ups. The range combines fast installation, encrypted two-way communication and built-in cloud connectivity to ensure buildings are effectively protected against sophisticated threats. New innovations New innovations in the range include: Cloud-based control with SecureConnect™ – Instantly upon installation, each system connects directly to Eaton’s SecureConnect™ platform via built-in Ethernet, with Wi-Fi and 4G options available. Installers can configure, monitor and update systems remotely, reducing site visits and improving response time. Signal Survey Mode – Built-in LED indicators show signal strength instantly, allowing installers to position devices for optimal performance before any drilling or fixing takes place. Backward compatibility – The SSR range works seamlessly with existing Eaton systems, making upgrades simple and cost-effective without the need to replace legacy devices. Reliability of a wired set-up SSR Range delivers the reliability of a wired set-up with the speed, flexibility, and remote control of a fully wireless solution The SSR Range delivers the reliability of a wired set-up with the speed, flexibility, and remote control of a fully wireless solution. This eliminates the need for disruptive retrofitting in occupied buildings, while helping businesses stay ahead of increasingly sophisticated break-in attempts and cyber intrusion risks. New SSR Range “Our new SSR Range combines the rock-solid reliability for which the Scantronic brand is known, with the smart, connected features modern security professionals demand,” said Peter Regan, Product Line Manager, Eaton. He adds, “By removing the need for hard-wired cabling, installers can work faster and more efficiently, while still delivering the highest levels of security. Built-in cloud access, intuitive installation tools, and robust two-way encryption mean systems are easy to deploy and resilient against the sophisticated threats faced by today’s commercial and residential customers.”
In this era of advanced technology, security and surveillance play pivotal roles in ensuring safety and comfort. This is especially true in the hospitality industry, where guests’ security is a significant concern. An area of notable focus is hotel surveillance systems, which have experienced an influx of technological innovation and transformation. As these systems evolve, they are reshaping the way hotels manage security, and subsequently, guest experience. This article will explore the emerging trends that are redefining hotel surveillance systems. Artificial Intelligence Artificial Intelligence (AI) has dramatically transformed various industries, including hotel security. The integration of AI into hotel surveillance systems enables more efficient monitoring and quicker response times. AI can analyse surveillance footage in real time, detecting unusual activities and alerting hotel management, allowing for swift action when necessary. By eliminating the need for constant human monitoring, AI-integrated systems enhance security while reducing operational costs. Cloud technology Cloud technology has also impacted hotel surveillance, presenting an efficient way to store and access surveillance footage. Cloud-based surveillance systems provide the advantage of remote access, enabling security teams to monitor hotel premises from virtually anywhere. According to an article from the Surveillance Video resource, this technology’s benefits go beyond mere convenience. Cloud storage provides an additional layer of security by safeguarding footage from physical tampering or destruction, as it might occur with traditional on-site storage systems. Wireless technology The rise of wireless technology has led to the development of surveillance systems that do not require intricate cabling systems. Wireless hotel surveillance systems offer flexibility and scalability. They can be easily installed and reconfigured based on the hotel’s needs, making them an excellent choice for hotels undergoing expansion or renovation. IoT in surveillance The Internet of Things (IoT) has taken a foothold in hotel surveillance. IoT devices such as smart locks and sensors can integrate with surveillance systems, providing comprehensive security coverage. These systems can monitor more than just people; they can track equipment, identify maintenance issues, and even monitor environmental changes, offering comprehensive coverage that enhances both security and operational efficiency. High-Definition (HD) video surveillance As camera technology evolves, hotels are increasingly adopting High-Definition (HD) video surveillance systems. These systems provide high-resolution images that allow for greater detail and clarity, making it easier to identify individuals or specific events in recorded footage. This increased detail can be crucial in investigating incidents and providing evidence when necessary. Emerging trends Emerging trends in hotel surveillance systems are progressively shaping the hospitality industry’s future. These technologies enhance security, streamline operations, and contribute to an improved guest experience. As technology continues to evolve, hotel surveillance systems will undoubtedly adapt, meeting new challenges and fulfilling the security needs of this ever-changing industry.
Imagine needing to install video cameras at a remote orchard or warehouse without electricity or internet infrastructure. Traditional wired systems leave you facing high cabling costs and complex installation processes. This is exactly why more users are now turning to wireless security solutions. The numbers tell the story. The global wireless security cameras market is expected to grow at a CAGR of 20% from 2024 to 2032. Beyond the statistics lies a fundamental shift in how they approach security – one that prioritises flexibility, user convenience, and cost-effectiveness. The real cost of traditional wired systems Before diving into wireless solutions, let's examine what users are escaping from: Installation Complexity: Traditional systems require professional installation, often involving wall drilling, cable routing through ceilings, and complex network configuration. Location Limitations: Wired cameras are constrained by power outlets and network connections, limiting their optimal placement. Scalability Challenges: Adding cameras to existing wired systems often means more drilling, more cables, and more disruption to daily operations. Infrastructure Dependencies: Power outages, cable damage, or network failures can disrupt the system. The cable-free revolution: more than just cutting cables Modern wireless or cable-free security systems don't just eliminate cables – they redefine how security should work. Here's what users gain: Rapid Deployment: Most wireless cameras take much less time to deploy than wired cameras. Flexible Placement: Position cameras anywhere within wireless signal range for optimal coverage. Scalability: Add or relocate cameras without infrastructure changes. Reliability: Advanced wireless technologies offer improved connection stability. Choosing the right wireless solution for the needs Not all wireless security systems are the same. Here's how to match solutions to the specific requirements: 1. For remote outdoor environments: Self-powered security solution Best for: Agricultural areas, construction sites, parking lots, remote facilities The solution: AOV (Always on Video) Solar 4G Cameras Why it works: 24/7 video recording: Non-stop recording with adaptable frame rates to capture critical events. AI-enhanced accuracy: Motion Detection 2.0 keeps false alarms low when detecting people or vehicles. Self-powered operations: Solar power keeps the camera running and eliminates regular electricity bills. Extreme environment ready: Operates reliably in forests, highways, and other remote locations with durable materials and design. Real-world value: A construction company can secure multiple sites by deploying AOV Solar 4G Cameras. These cameras are ideal for temporary security needs without investing in power and network infrastructure. 2. For large spaces: Comprehensive multi-camera management Best for: Multi-story shops, supermarkets, warehouses, large residential properties The solution: EasyLink Wi-Fi NVR Kit Why it works: Multi-camera deployment: Supports up to eight security cameras with centralised management. Reliable connectivity: Wi-Fi 6 delivers faster data speeds and handles more devices simultaneously. Recording and live viewing continue even during internet outages. Professional monitoring: HDMI 4K output displays up to four video feeds simultaneously on HD monitors for efficient on-site management. High-capacity storage: Network Video Recorder (NVR) supports hard drives up to 8 TB for extended recording time. Real-world value: A two-story fashion shop can deploy an EasyLink Wi-Fi NVR Kit with 5-6 cameras for complete coverage. They can even display the live feed on a large LED screen in the shop or at the entrance as a promotional tool. 3. For small spaces: Quick setup, easy use Best for: Small retail stores, cafes, small offices, residential properties The solution: EasyLink Wi-Fi NVS Kit Why it works: Setup in minutes: Scan the QR code on the Network Video Storage (NVS) for easy setup, significantly reducing individual camera configuration requirements. Reliable connectivity: Wi-Fi 6 delivers faster data speeds and handles more devices simultaneously. Recording and live viewing continue even during internet outages. Secure storage: Centralised NVS with an up to 512 GB SD card capacity keeps footage safe locally. Router flexibility: Change routers without reconfiguring the entire system. Real-world value: A community store owner can deploy a 2-camera EasyLink Wi-Fi NVS Kit in about an hour. Future-proof the security investment While the Cable-Free Series Products are already available to meet current needs, security technology continues advancing with emerging trends: AI integration: Smarter detection algorithms further reducing false alarms Extended battery life: Solar and improved battery technologies extending operational periods 5G connectivity: Faster, more reliable cellular connections Edge computing: On-device processing reducing bandwidth needs and accelerating responses What this means for users: Now, wireless investments position them to easily adopt future enhancements without infrastructure changes. Selecting the cable-free solution Hikvision’s Cable-Free Series Products aren't just about cutting cables – they're about cutting costs, reducing complexity, and increasing flexibility. Whether they're securing a small business, protecting a large facility, or monitoring remote property, there's a cable-free solution that fits their needs. Consider which solution best meets the security and operational needs. For more information, reach out to the security experts for tailored recommendations.
Florida Institute of Technology (FIT) and Denison College have partnered with Transact + CBORD and Allegion US to implement mobile credential technology across their campuses. The initiative aims to enhance satisfaction by enabling students to connect to their campuses using the technology they use most: their mobile devices. This collaboration highlights both institutions' commitment to leveraging innovation to improve campus life. New mobile credentials The implementation of Mobile Student ID in Apple Wallet® and Google Wallet™ allows students to access facilities, residence halls, and campus amenities using their phones, eliminating the need for traditional ID cards. The new mobile credentials will seamlessly integrate with each school's established secure and configurable access control system, CS Access. Allegion hardware infrastructure The process involved replacing only the reader modules on existing Schlage AD-400 wireless locks At FIT, the shift to mobile credentials required upgrading an established Allegion hardware infrastructure, which included Schlage MT readers. The process involved replacing only the reader modules on existing Schlage AD-400 wireless locks, streamlining the transition. In contrast, Denison College, which installed its Allegion hardware infrastructure in 2021 with Schlage MTB readers and LE/ NDE mobile-enabled wireless locks, was already prepared to support mobile credentials, enabling a seamless and efficient transition. Impressive adoption rates "With the successful mobile Wallet launches at FIT and Denison, it’s evident that mobile credentials are a viable solution for campuses of all sizes and profiles,” said Jeff Koziol, Business Development Manager at Allegion. “Congratulations to Denison and FIT for their well-executed rollouts and the impressive adoption rates achieved since implementation earlier this year." New standard for campus security FIT’s needs to update its legacy infrastructure and Denison’s recent adoption of modern secure hardware Despite differences in their starting points, FIT’s need to update legacy infrastructure and Denison’s recent adoption of modern, more secure hardware, the shift to mobile credentials at both institutions is a direct response to student feedback and the growing need to align campus services with the needs of students. By reducing the reliance on physical ID cards and enabling secure access through mobile devices, FIT and Denison College are setting a new standard for campus security, connectivity, and convenience. Digital expectations “By adopting digital IDs, schools like FIT and Denison are doing more than modernising credentials — they're showing an earnest commitment to student success," said Rasheed Behrooznia, Executive Vice President & General Manager, Campus ID and Commerce for Transact + CBORD. "Digital IDs have proven to remove barriers, foster a greater sense of belonging, and meet digital expectations. Today’s announcement marks an important shift toward an inclusive, secure, mobile-first campus experience for students at both of these schools.”
Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, announced it will launch its second data centre in South Korea by the end of June 2025 in response to the growing demand for cloud computing and AI services from local businesses. The investment – made three years after the establishment of Alibaba Cloud’s first data centre in South Korea in 2022 - demonstrates its continued commitment to investing in South Korea, fostering AI transformation among local businesses. This launch is in response to the anticipated demand for AI infrastructure, driven by the increased adoption of generative AI services. Alibaba Cloud’s efforts Launch of the second data centre marks a milestone in Alibaba Cloud’s steps to diversify its products The launch of the second data centre also marks a milestone in Alibaba Cloud’s efforts to diversify its products and services in South Korea. With the new data centre, Alibaba Cloud will broaden its product offerings to include a wider selection of cloud-native, big data, and database products that better support customers' AI applications. It will bring significant improvements in cloud resilience and network performance, along with enhanced capabilities for high availability and disaster recovery for core cloud products. Advancement of AI-based technologies "In line with the rapid advancement of AI-based technologies and increasing digital demand across industries, Alibaba Cloud has been continuously expanding its infrastructure in South Korea," said Yoon Yong-joon, Country Manager of South Korea, Alibaba Cloud Intelligence. "Through the launch of this second data centre, Alibaba Cloud will provide customers with more resilient and adaptable cloud environments, ultimately fostering AI innovation across various sectors and expanding the digital ecosystem.” Building a stronger ecosystem jointly with partners and clients Some of them have leveraged Alibaba Cloud’s flagship large language model Qwen and its infrastructure Alibaba Cloud entered the South Korean market in 2016. It has since offered scalable, secure and cost-effective services, to help drive digital transformation for a large variety of industries in South Korea while supporting their global expansion outside of South Korea. Some of them have leveraged Alibaba Cloud’s flagship large language model Qwen and its scalable global cloud infrastructure to deliver innovative solutions. Alibaba Cloud's generative AI technology Univa, a pioneering AI solutions provider in South Korea, has recently unveiled its 'Agent AI' solution, powered by Alibaba Cloud's generative AI technology and robust cloud infrastructure. A critical factor in selecting Qwen was its exceptional performance in Korean language processing, ensuring that Univa's new solution effectively addresses the specific needs of the Korean market. Nam MyungJin, CEO of Univa said, “Our collaboration with Alibaba Cloud has been pivotal in turning our vision into reality. Its cutting-edge cloud and AI technology has not only reduced costs by over 30%, but also enhanced Korean language processing accuracy from 45% to 95%.” Snow's innovative app Snow's innovative app offers users a wide range of preset styles and the ability to upload custom style Snow, a subsidiary of Naver, leverages Alibaba Cloud’s advanced AI video generation model Wan to support its app’s image stylisation function in China. Powered by Wan’s technology, Snow's innovative app offers users a wide range of preset styles and the ability to upload custom style templates. This versatile functionality enables the creation of highly personalised portraits tailored to meet unique specifications, providing users with an unparalleled portrait stylisation experience. Lala Station, a pioneering Korean livestreaming company, has successfully expanded its business into the Southeast Asian market through a collaboration with Alibaba Cloud that began in 2022. By leveraging Alibaba Cloud’s advanced cloud technologies and a comprehensive e-commerce livestreaming solution, Lala Station has developed its global livestreaming platform with robust capabilities. Strong partnership strategy “Thanks to Alibaba Cloud’s strong global infrastructure, our platform provides not only a rich and seamless online shopping experience for Korean consumers, but also for customers in Southeast Asia,” said Lee Cheol-ho, CEO of Lala Station. “With Alibaba Cloud’s support, we have been able to scale our operations and enhance engagement with our audience across diverse markets.” Alibaba Cloud is also pursuing a strong partnership strategy to enhance its services in the South Korean market. It has partnered with pioneering local firms such as Megazone Soft, ETECH SYSTEM and ITCENCLOIT to deliver tailored consulting services and industry-specific solutions. Complex digital transformations MegazoneSoft Corp, a cloud and AI solution provider in the Asia Pacific region, is teaming with Alibaba Cloud MegazoneSoft Corporation, a pioneering cloud and AI solution provider in the Asia Pacific region, is collaborating with Alibaba Cloud to further expand its presence across key markets. “MegazoneSoft brings unmatched cloud and AI expertise and a deep understanding of complex digital transformations,” said Mintaek Suh, EVP of MegazoneSoft. “Our collaboration with Alibaba Cloud enables us to help customers who are increasingly asking for scalable hybrid and multi-cloud solutions that are tailored to the evolving needs of businesses in this region.” Information security certification Alibaba Cloud entered the South Korean market in 2016 and built its first data centre in the country in March 2022. As the world’s pioneering and Asia Pacific’s pioneering Infrastructure as a Service (IaaS) service provider, Alibaba Cloud has received the Korea Information Security Management System (K-ISMS) certification for its data centre infrastructure in South Korea in December 2023. As the most recognised information security certification in South Korea, K-ISMS ensures that Alibaba Cloud’s services and practices are in line with stringent compliance regulations, and enables enterprise customers to enjoy cloud services with enhanced protection.


Expert commentary
In the ever-evolving struggle between cyber offence and defence, attackers have almost always moved first. In the emerging domain of artificial intelligence, this pattern appears to be repeating itself. Yet, global cybersecurity pioneers appear disconcertingly disengaged. Just over half even agree that AI-driven attacks are set to become dramatically more complex and widespread. Equally concerning is the widespread apathy regarding AI’s role in expanding an already sprawling corporate attack surface. This is no small oversight. A recent global Trend Micro study showed that 73 percent of organisations have already suffered cybersecurity incidents due to unknown or unmanaged assets. In an era where digital blind spots are both common and consequential, hesitation is a risk few can afford. Security has to shift from reactive protection to proactive risk exposure management. The opportunity and the risk of AI Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT The potential for AI to transform enterprise operations is enormous, but so is the risk. The warnings have been loud and clear. As early as the first quarter of 2024, the UK’s National Cyber Security Centre (NCSC) stated that AI would “almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years.” Their prediction is proving accurate. Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT, freely traded as services on the dark web, as well as malicious models like FraudGPT, built on open-source large language models (LLMs). These tools are no longer just about automating tasks; they are turbocharging the entire attack lifecycle. From more convincing phishing emails and precise target selection, to sophisticated malware creation and lateral movement within breached systems, AI is driving a step-change in threat actor capability. Integrating open-source models However, this is only one side of the coin. The other, often overlooked, is AI’s impact on the corporate attack surface. Even well-meaning employees can unintentionally expand organisational risk. The widespread use of AI-as-a-service tools like ChatGPT introduces significant shadow IT concerns, especially when sensitive business information is input without proper oversight. Data processing and storage practices for many of these services remain opaque, raising additional compliance concerns under regulations like the UK GDPR and the EU’s AI Act. For those organisations that choose to build or customise their own LLMs, the risks multiply. Integrating open-source models may expose businesses to vulnerabilities, misconfigurations and flawed dependencies. Each new tool and environment adds to the complexity of an attack surface already strained by remote work setups, sprawling cloud deployments, IoT ecosystems, and accelerating digital transformation programmes. Managing the expanding risk landscape Many have already shared security incidents where a lack of asset visibility was the root cause Many security pioneers do understand what is at stake. Nine in ten agree that effective attack surface management is tied directly to business risk. They cite a long list of potential consequences, disruptions to operations, reputational damage, declining competitiveness, strained supplier relationships, financial losses and reduced staff productivity. Many have already experienced security incidents where a lack of asset visibility was the root cause. Despite this recognition, however, the response remains largely inadequate. Fewer than half of global organisations use dedicated tools to monitor their attack surface proactively. On average, only a quarter of cybersecurity budgets are allocated to managing cyber risk exposure. Third-party risk management is similarly neglected: fewer than half of firms actively monitor their vendors for vulnerabilities. This inertia creates an obvious contradiction. Security pioneers understand the business implications of unmanaged risk, but they are not equipping themselves with the tools or processes to respond. That needs to change—and fast. How AI can help defenders take the lead There is good news: AI is not only a weapon for cybercriminals. It can also be a powerful ally for defenders, particularly in the field of Cyber Risk Exposure Management (CREM). The best tools in this category use AI to continuously scan an organisation’s entire digital footprint. They can automatically detect vulnerabilities, spot misconfigurations, identify rogue or shadow assets, and provide prioritised remediation recommendations. CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats Intelligent algorithms can also analyse network behaviour to identify anomalies that could signal a breach in progress. Unlike traditional tools, which often drown analysts in noise, CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats. For overburdened security teams, this enables a far more focused and effective response. However, the keyword here is “continuous.” The nature of today’s IT environments, especially in the cloud, is dynamic and fast-moving. Assets appear and disappear within minutes. Static, point-in-time assessments are no longer sufficient. Yet more than half of organisations still lack continuous scanning processes. This leaves them exposed to risks that might persist undetected for weeks or months. Overcoming barriers to adoption So what is holding organisations back? In many cases, it’s not the technology itself but the internal politics of investment. Security pioneers interested in CREM tools often prioritise real-time alerting, clear dashboards, and seamless integration with their existing environments. All of this is now achievable. The challenge lies in securing board-level support. Many security teams still work in silos, disconnected from the broader business Boards are often cautious when it comes to cybersecurity investment, particularly when immediate ROI is not clear. To gain their trust, security pioneers must learn to speak the language of business risk, not technical threat. They must frame cyber exposure in terms of reputational impact, regulatory liability, operational continuity, and investor confidence. There is also a cultural component. Many security teams still work in silos, disconnected from the broader business. This limits their influence and makes it harder to embed security as a strategic enabler. In the AI era, this divide must be bridged. Cybersecurity must become a board-level concern, and risk exposure must be treated as a fundamental operational issue. Time to act We are at a critical inflection point. The AI revolution is not on the horizon, it is already here. Threat actors are moving rapidly to exploit it, leveraging tools and techniques that were unthinkable just a few years ago. Meanwhile, organisations remain slow to respond. Too few are investing in the tools, processes, and people needed to manage their risk exposure effectively. AI can be used not only to attack but to defend. CREM tools powered by AI offer a powerful way to regain visibility, restore control, and build lasting resilience. They enable proactive rather than reactive security. And they help organisations align their cybersecurity strategy with their broader business objectives. Security teams have to elevate the conversation. They must advocate not just for new tools, but for a new mindset, one that treats cyber risk as an enterprise risk, and one that prioritises continuous visibility as a prerequisite for resilience.
In 2021, New Orleans took bold steps to modernise its public safety strategy after experiencing a dramatic increase in criminal activity. The city invested $70M in advanced video security systems, placing smart cameras in high-risk areas like busy transit hubs and crowded public spaces to promote community safety. The cameras weren’t just traditional CCTV setups—they were smart security solutions equipped with real-time alerts that leverage AI-powered analytics, facial recognition and cloud-based technology. Reinforcing public safety Law enforcement agencies improved their response times and investigative outcomes Within months, the impact was clear: theft and burglaries of vehicles, residential and business properties reduced up to 48% total between 2022 and 2023. With 24-hour monitoring and rapid access to critical footage, law enforcement agencies improved their response times and investigative outcomes, reinforcing public safety across the city. The role of video security in community safety One of the most effective ways to keep communities safe is through video security solutions that allow real-time monitoring and provide rapid responses. Modern Video Surveillance as a Service (VSaaS) platforms allow security professionals to monitor spaces continuously, providing instant alerts for any suspicious activities. Advances in this technology are transforming the way businesses and organisations approach community safety, playing a pivotal role in creating safer environments, deterring crime, and enabling faster incident response. Video security solutions Video security solutions also contribute significantly to public safety by monitoring high-traffic areas such as public parks, busy transportation hubs, and crowded city streets. When security cameras are visible, not only do they act as a deterrent to potential criminals, but they can also significantly reduce the likelihood of theft, vandalism, and violent crime. Video security solutions also contribute greatly to public safety by monitoring high-traffic areas Similarly, large gatherings such as concerts, sporting events, and festivals present unique challenges that require a multifaceted approach to security. With thousands of attendees in a confined space, effective security measures are essential to prevent overcrowding, unauthorised access, and potential threats. In situations like these, advanced video security systems can aid in efficient crowd management, allowing event organisers to respond and react quickly in the event of an emergency. The future of smart security solutions Today, video security solutions are becoming smarter and more adaptable than ever before. For example, innovations such as solar-powered security units ensure continuous monitoring even in remote or off-grid locations, contributing to broader, more sustainable coverage. Recent developments like AI-enhanced analytics help filter out false alarms while focusing on threats, improving response times and efficiency. By embracing modern security solutions, municipalities, businesses, and event organisers can take proactive steps to protect their communities when it matters most. Public safety will always be an ongoing challenge for businesses and organisations alike for a multitude of reasons; however, the role of advanced video security systems in promoting public safety is more important than ever before.
March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observance aligns with Women’s History Month, providing an opportunity to reflect on the progress made and the work still needed to advance gender equity in security. Evolving role of women in security The security industry has witnessed a steady increase in women's participation. According to ISC2 Research in its “Women’s Role in Filling the Workforce Gap” report, women make up an estimated 20 to 25 percent of the security industry. Promisingly, younger generations are entering the profession at higher rates, with 26 percent of working professionals under 30 identifying as women. The security industry has witnessed a steady increase in women's participation The research tells us that women are thriving in a variety of roles, from engineering and system administration to sales, marketing, and project leadership. Key factors driving this transformation include mentorship programs, male allies advocating for gender equality, and cultural shifts recognising the unique perspectives and strengths women bring to security challenges. These efforts are fostering more inclusive environments and ultimately strengthening the industry. The value of diverse perspectives in security Security is not a one-size-fits-all industry—each organisation and facility has unique needs that require varied perspectives. Greater representation of women has introduced fresh approaches to problem-solving, fostering collaboration and driving innovation. By integrating diverse viewpoints, security professionals can create more effective solutions that better address end-user needs. Industry support for women’s professional growth SIA's WISF offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER Organisations like the Security Industry Association (SIA) and ASIS International have established networking platforms and initiatives to support women in security. Events such as the Security LeadHER Conference provide valuable professional development and networking opportunities. Companies are also investing in science, technology, engineering, and mathematics (STEM) initiatives, hands-on training, and recruitment programs to attract more women into the field. Additionally, SIA's Women in Security Forum (WISF) offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER, which provide pathways for engagement and growth. Challenges women in security face Despite progress, challenges remain. Many women still feel it necessary to repeatedly prove their expertise, take on additional informal responsibilities, or carefully navigate workplace dynamics. Imposter syndrome can be another hurdle, even for accomplished professionals. However, women in security are addressing these challenges by setting boundaries, advocating for themselves, and supporting one another through mentorship. By excelling in leadership and technical roles, women are reshaping outdated perceptions and advocating for more inclusive workplace policies. Steps industry pioneers can take To further support women in security, industry pioneers could: Provide targeted professional development and career advancement opportunities. Foster strong, supportive communities that recognise and mentor women. Implement structured mentorship programs that connect experienced professionals with newcomers. Promote workplace flexibility to help employees balance personal and career commitments. Actively challenge biases and advocate for meaningful change within organisations. Advice for women entering the security field Here are key pieces of advice for women considering a career in security: Own Your Expertise – Have confidence in your knowledge and skills. Seek Out Mentors & Allies – Connect with supportive professionals who can guide your career. Build a Strong Network – Join organisations like ASIS Women in Security, SIA Women in Security Forum, or Women in CyberSecurity (WiCyS), and attend industry events to expand your connections. Speak Up & Take Space – Confidently share your ideas and challenge outdated norms. Develop Resilience & Advocate for Yourself – Push past biases, demand the respect you deserve, and negotiate for fair salaries and promotions. Keep Learning & Stay Ahead – Continually build your expertise to stay competitive in the evolving security industry. The future of women in security As the security industry evolves with technological advancements and global changes, opportunities for women will continue to expand. Women are not just participating in the industry’s growth—they are shaping its future. With growing mentorship programs, male allies advocating for gender equality, and ongoing cultural shifts, the focus is no longer just on breaking barriers but on building bridges to new opportunities.
Security beat
For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organisations modernise their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximising value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritising interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities. {##Poll1743085396 - What is the biggest challenge you face with your current access control system?##}
The practice of executive protection changed forever on Dec. 4, 2024, when UnitedHealthcare CEO Brian Thompson was shot outside a Manhattan, New York, hotel. The shocking event raised awareness in board rooms around the world about the need for, and challenges of, executive protection. Questions followed immediately, including why was the high-level executive not protected? Combination of risk and reward UnitedHealthcare’s stock price has gone down more than 20% since the shooting The event also highlighted what is at stake for companies, extending beyond the safety of executives and impacting many factors, even including a company’s stock price. UnitedHealthcare’s stock price has gone down more than 20% since the shooting, equating to tens of billions of dollars. “Companies are considering the combination of risk and reward like never before when it comes to executive protection,” says Glen Kucera, President of Allied Universal Enhanced Protection Services. “What are the chances this could happen? Before Dec. 4 many thought it was zero. And what are the financial implications for a company if it happens? Executive protection is a small investment to protect against a worst-case scenario.” Evaluation of an executive protection Before the UnitedHealthcare shooting raised awareness, fewer than 50% of executives had protection. But concerns that previously fell on deaf ears now have the full attention of companies, says Kucera. “Boards of directors are having to figure this out,” he adds. “They may not have executive protection, but now they have to do it.” A threat assessment, conducted by a company such as Allied Universal, provides an independent evaluation of a company’s executive protection needs. The assessment evaluates factors such as an executive’s travel habits, the safety of their home, etc. Does the executive need protection 24/7, or just when they travel into more dangerous areas? Risks increase related to corporate earnings Sometimes, cases increase the need for executive protection, such as an internal threat In assessing threats, security professionals also look beyond the individual to consider the safety of a corporate facility, for example. “Is there a visual deterrent, controlling who comes and goes?” asks Kucera. “If there is good security, it all ties together. We do home assessment, facility assessment, route assessment, and travel assessment as needed.” Sometimes, circumstances increase the need for executive protection, such as an internal threat. Timing is a factor, and risks increase related to corporate earnings releases, new product announcements, and corporate layoffs or consolidation. Monitoring social media tracks shifting threats that impact the need for executive protection. UnitedHealthcare shooting “He didn’t have it and probably didn’t think he needed it,” comments Kucera about the UnitedHealthcare executive who was gunned down in the streets of New York City. “He was staying at the hotel across the street and was used to walking down the street every day.” “Sometimes executives want to preserve their privacy and be able to walk down the street,” says Kucera. “Getting protection can be seen as a sign of weakness. Some CEOs in the past have said they just didn’t want it.” However, the UnitedHealthcare shooting raised the stakes of the need for more vigilance. “The bottom line is you have to yet beyond objections and make the investment to protect against a worst-case scenario,” says Kucera. Anti-capitalist sentiment in the general population An internal police bulletin warned of an online hit list naming eight executives and their salaries Threats to executives sometimes arise from anti-capitalist sentiment in the general population about perceived inequalities in wealth and power. Executives provide symbolic targets for anyone who fights the system, and social media has amplified the voices of those who oppose capitalism. For example, a "Most Wanted CEO” card deck seeks to shine a spotlight on "titans of greed." Also, in the aftermath of the UnitedHealthcare shooting, CEO "wanted" posters appeared across New York City, threatening various executives of large companies. An internal police bulletin warned of an online hit list naming eight executives and their salaries. Careful monitoring of social media posts Careful monitoring of social media posts and other sources enables executive protection professionals to analyse data and separate the dangerous threats from the merely negative ones. Sadly, positive support of the UnitedHealthcare shooting was expressed by the 300,000 or so followers of the shooter, who became a celebrity of sorts. A huge outcry of negative sentiment toward the insurance industry led to fear that copycat incidents might occur. “There has been an unprecedented amount of positive support for committing murder,” commented Kucera. Executive protection requests HR executives can be at risk, especially at a time of layoffs or consolidation “Let’s face it, there has been a lot of controversy, from COVID to the Middle East crisis, to the political campaign, and there is negativity on both sides,” says Kucera. “People have opportunities to pick sides, and there is a lot of sentiment going both ways, and there is a small percentage of people who will act aggressively.” Executive protection requests now extend beyond the CEO to include others in the management ranks of companies. Basically, any public-facing executive is at risk, including anyone who makes statements to the press. Human resource (HR) executives can be at risk, especially at a time of layoffs or consolidation. Private information on the Internet Typically, an executive is assigned a single armed operative for protection. The firearm serves primarily as a visual deterrent that hopefully makes a potential perpetrator think twice. “When they plan an event like this, their expectation is that it will be a soft target,” says Kucera. “If there is an officer, it gives them pause.” Controversial or high-profile CEOs are typically protected 24/7, including when they travel with their family. Adding risks is the fact that private information is now posted on the Internet, including where an executive lives and where their children go to school. Internet monitoring Internet monitoring also includes the “dark web,” which includes sometimes dangerous information “We offer social media monitoring, and we advise them to be more careful with what they post,” says Kucera. “We monitor reactions to posts including any that might be threatening. We watch social media carefully if a company announces earnings or a change in their service or product offering.” Internet monitoring also includes the “dark web,” which includes sometimes dangerous information that is intentionally hidden and requires specific software, configurations, or authorisation to access. Own layer of protection Public and government officials can also come under fire in a variety of scenarios. FEMA officials faced threats after the recent floods in the Southeast, for example, among other situations where perceived unfair treatment promotes thoughts of retribution. Although government agencies have their own layer of protection, there are instances when they call on companies such as Allied Universal for additional help. Ad hoc protection for various executives In the aftermath of the UnitedHealthcare shooting, calls to Allied Universal’s Command Centre increased by 600%, reflecting requests for ad hoc protection for various executives. These requests are in addition to the company’s business providing “embedded” operatives that travel with executives all or some of the time. On that side of the business, requests for services are up probably 300%, says Kucera. {##Poll1742194323 - Has the recent increase in violent threats changed your company's view on executive protection?##}
Case studies
Garden Spot Communities, a continuing care retirement facility in New Holland, Pennsylvania, has grown a comprehensive video security solution over nearly 20 years that maintains the facility's welcoming, open-door philosophy, while ensuring resident safety. The community operates public restaurants and welcomes neighbours across its 230-acre campus, while securing 1,100 residents using Milestone Systems XProtect video management software (VMS). Technology partnership Garden Spot maintains an intentionally open campus that includes a Starbucks cafe open to the public Garden Spot Communities, along with their Lancaster-based integrator partner App-Techs, have continually expanded their Milestone XProtect VMS to cover the unique needs of their nearly 1.4 million square foot facility, which accommodates diverse camera brands and technologies. Unlike traditional senior living facilities that rely on gates and fences, Garden Spot maintains an intentionally open campus that includes a Starbucks cafe open to the public. The system includes wireless links extending coverage to perimeter areas up to 300 metres from main buildings, supporting the facility's philosophy of openness rather than barriers. Eyes across campus "Having a comprehensive video system is key to our operating such a large enterprise," said Steve Muller, Chief Operating Officer at Garden Spot Communities. He adds, "Garden Spot's core philosophy from the very beginning is that what we don't spend on fences and gates, we can spend on cameras. We need to have eyes on what's happening across campus, and with a system like Milestone, we can do exactly that." Operational benefits The video system serves as an integral operational tool, enabling staff to respond quickly to emergencies The video system serves as an integral operational tool, enabling staff to respond quickly to emergencies and maintain situational awareness across the campus. The technology provides enhanced safety, improved operational efficiency, and valuable peace of mind for staff and families. Staff access video feeds from security workstations, office desktops, and mobile phones for timely response to situations. The system proves most valuable when a resident is missing from their normal routine, with staff turning to video as their first investigative step. In one case, cameras enabled rapid response to locate a gentleman with dementia who had left campus, preventing potential harm. Seamless monitoring Beyond security, the system supports operational needs, including weather monitoring during Pennsylvania winters and remote monitoring of the facility's aeroponic greenhouse. The system operates across multiple Dell servers with centralised management, enabling seamless monitoring from a single interface. App-Techs' Health Utility Monitor software provides telemetry data every five minutes, enabling proactive maintenance that resolves issues before staff notice them. Open platform The open platform approach provides flexibility in camera selection rather than locking the facility into a single manufacturer. This flexibility enabled system evolution from a four-camera installation in 2006 to today's comprehensive 110-camera network. The partnership with App-Techs extends beyond installation to ongoing system health monitoring, ensuring consistent performance while allowing Garden Spot staff to focus on operations rather than technical troubleshooting. Garden Spot's experience demonstrates how open platform video technology can support organisational values, while providing essential operational capabilities. The system has adapted and grown alongside facility needs, proving that investments in scalable technology provide lasting value for senior living communities seeking to balance security with community openness.
Iveda®, a pioneer in AI-driven video surveillance and smart-city technologies, announced that Subic Sun Development, Inc. has chosen the IvedaAI™ platform as the video surveillance solution for the soon-to-open Subic Sun Resort, Convention & Casino. IvedaAI was selected early in the build-out to inform camera placement and ensure frictionless integration with future-ready, AI-powered analytics. Focus on safety and service Located on the former U.S. naval base in the Subic Bay Freeport Zone—a special economic hub that hosts thousands of international and local businesses—the resort will feature 500 guest rooms, a state-of-the-art convention centre, a luxury casino, and two Accor-brand hotels, Ibis Styles and Mercure, scheduled to open in December 2025. The decision comes as global resort operators sharpen their focus on safety, service and operational efficiency. The global resort market generated $347 billion in 2024 and is projected to reach nearly $945 billion by 2030, an 18.5% CAGR. IvedaAI’s AI-enabled video analytics IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster IvedaAI’s AI-enabled video analytics will help property staff lower security costs, respond to incidents faster and unlock data-driven insights that boost both guest satisfaction and bottom-line performance. “Iveda being selected as a premier security and surveillance provider before the first Subic Sun Resort guest ever checks in is a powerful endorsement of our commitment to providing state-of- the-art monitoring technology,” said David Ly, CEO and Founder of Iveda. IvedaAI’s real-time analytics Ly added: “By designing camera layouts around IvedaAI’s real-time analytics, Subic Sun can optimise coverage, reduce blind spots, and deliver safer, smoother guest experiences—without a costly equipment overhaul. We expect more ground-up projects to follow this blueprint.” Iveda Philippines—Iveda’s joint venture focused on nationwide smart-city deployment—secured the Subic Sun contract and will oversee the on-site rollout. The win represents the team’s first major hospitality project and advances its plan to generate US$ 3 million in smart-city revenue by FY 2026, building on the broader initiative it announced last year.
Comelit-PAC has successfully upgraded the access control infrastructure at Blackpool Victoria Hospital, ensuring a seamless and secure environment for staff, patients, and visitors. Blackpool Victoria Hospital is one of the largest and busiest hospitals in the Northwest, providing essential healthcare services to thousands of patients each year. As a pioneering medical facility, ensuring a secure and efficient environment is a top priority. Integrated PAC Access Central Security technology works programme integrated PAC Access Central with multiple PC workstations Designed to provide a robust and scalable security solution, the security technology works programme integrated PAC Access Central with multiple PC workstations for comprehensive global administration across the hospital’s network To safeguard critical areas within the hospital, Comelit-PAC’s advanced 500 series controllers were utilised. This includes the 511, 512 model door controllers linked into the existing 500 Access & Alarm servers on site, offering a mix of ethernet and RS485 connectivity to enhance system flexibility and efficiency. Security and administrative control Martyn McKechnie, Head of Digital Identity at Blackpool Victoria Hospital, commented: "As a busy hospital with multiple departments and critical areas, we required an access control system that could integrate seamlessly while offering high levels of security and administrative control." Martyn McKechnie adds, "PAC Access Central provides the scalability and reliability we need to manage hospital-wide access efficiently. The ability to oversee all access points from multiple PC workstations ensures our Digital Identity and Security teams can respond quickly to any situation." Future-proof access control system Blackpool Victoria Hospital benefits from a resilient and future-proof access control system A key element of the installation is its server-based architecture, providing enhanced security measures and fail-safe redundancy. This ensures Blackpool Victoria Hospital benefits from a resilient and future-proof access control system, capable of meeting the bespoke demands of the healthcare environment. Advanced security infrastructure Jason Sullivan, PAC/GDX Strategic Development Manager at Comelit-PAC, said: "We worked closely with Blackpool Victoria Hospital right from the initial specification stage to deliver a solution to balance security with ease of management." Jason Sullivan adds, "PAC Access Central presents a future-proof system that allows the hospital to maintain strict access control, while adapting to evolving needs. By adopting this advanced security infrastructure, Blackpool Victoria Hospital continues its commitment to maintaining a safe and secure environment, leveraging Comelit-PAC’s expertise in access control technology."
In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full US Department of Homeland Security SAFETY Act Designation, announced that its solution has been deployed by Ki Charter to safeguard students, faculty and staff against gun-related threats. It is the first charter school in Texas to adopt the industry-pioneering proactive gun detection and intelligent situational awareness technology. Adopted multiple technologies Ki Charter has adopted multiple technologies and de-escalation techniques to ensure the safety Serving a unique population of behaviourally challenged students, Ki Charter has adopted multiple technologies and de-escalation techniques to ensure the safety of its students and personnel. Its Safety and Security Committee assesses and refines policies and safety measures, while the Campus Safety and Threat Assessment teams work closely with law enforcement and mental health resources to prevent and mitigate potential threats. Deployment of ZeroEyes’ AI technology The deployment of ZeroEyes’ AI technology further strengthens this comprehensive security strategy by providing real-time gun detection capabilities. “We serve a student population that requires an exceptional level of care and security, and I was initially skeptical of ZeroEyes,” said Jerry Lager, Superintendent of Ki Charter. “But after seeing the technology in action, I knew we needed it. Our largest campus spans 65 open acres, making security a complex challenge. ZeroEyes provides that extra layer of protection, ensuring our students and staff are in a safe environment.” Ki Charter reduces learning gaps Ki Charter is the premier educational provider for students who reside in residential facilities Ki Charter is the premier educational provider for students who reside in residential facilities (RFs) and day centres across Texas. The school has campuses in San Marcos, Liberty Hill, Austin, Temple, Arlington, Fort Worth, Denton, and Kingwood, and serves over 6,500 students annually (500% mobility rate) with a dedicated team of more than 120 educators and staff. With small class sizes and engaging curriculum, Ki Charter reduces learning gaps to help students learn behavioural management strategies and improve their communication skills. ZeroEyes’ AI gun detection ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. Local law enforcement and school security as quickly as 3 to 5 seconds from detection If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school security as quickly as 3 to 5 seconds from detection. AI gun detection technology “At ZeroEyes, we understand the complexities of protecting students in specialized environments like Ki Charter,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We’re proud to offer our AI gun detection technology as an additional layer of security to help protect students, faculty, and staff in this unique setting.”
Fibra Activos Inmobiliarios has selected Gunnebo Entrance Control’s speed gates for its prestigious Edificio FIBRA Camino Real project in San Isidro Golf as part of its commitment to delivering high-value real estate developments that align with modern architectural and environmental standards. Fibra Activos Inmobiliarios, a pioneering real estate asset management company, has been operating for over a decade with a focus on sustainable project development. With multiple LEED-certified buildings in its portfolio, the company prioritises solutions that enhance security, efficiency, and environmental responsibility. Gunnebo Entrance Control’s SpeedStile FLs SpeedStile FLs units were selected for its intelligent detection system, ensuring safe To meet these requirements, Fibra specified Gunnebo Entrance Control’s SpeedStile FLs, a premium entrance control solution designed to provide secure and seamless entry in high-traffic environments. The SpeedStile FLs units were selected for its intelligent detection system, ensuring safe and controlled access, as well as a sleek and customisable design, which integrates effortlessly into modern architectural spaces. Advanced entrance control systems “Security and sustainability are fundamental to all our projects, and integrating advanced entrance control systems such as SpeedStile FLs aligns perfectly with our vision,” said Juan Carlos Azcoytia, Asset Manager at Fibra Activos Inmobiliarios. “Not only does it provide a secure and efficient solution for our tenants and visitors, but it also supports our LEED certification goals, reinforcing our commitment to energy efficiency and long-term value.” Fibra’s dedication Installation underscores Fibra’s dedication to using the best available technology to enhance A total of five SpeedStile FLs units were installed at Edificio FIBRA Camino Real, seamlessly blending security with aesthetics while maintaining a reduced footprint for optimised space utilisation. This installation underscores Fibra’s dedication to using the best available technology to enhance both security and the user experience. “With SpeedStile FLs installed at Edificio FIBRA Camino Real, we are proud to provide a solution that not only strengthens security but also supports sustainability initiatives in modern real estate projects,” said Mathieu Michel, Global Partner Network Director at Gunnebo Entrance Control. Innovative entrance control solutions Michel added: “Our commitment is to deliver innovative entrance control solutions that seamlessly integrate into contemporary architectural spaces, ensuring safety, efficiency, and long-term value.” Gunnebo Entrance Control SpeedStile FLs has a standby mode that contributes to LEED, prioritising the use of energy-efficient equipment. Its third-party verified EPD can also contribute to certification in projects striving for more sustainable design and operation.


Round table discussion
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the security marketplace, it is not about predicting the exact jobs of the future, but rather equipping yourself to adapt and thrive in the uncertain security landscape. But where to begin? The emerging technology shifts in the security industry provide clues, such as the growing importance of cybersecurity and artificial intelligence (AI). We asked our Expert Panel Roundtable: How can physical security professionals “future-proof” their skillsets to prepare for emerging technologies?
In the physical security marketplace, artificial intelligence (AI) has evolved beyond the novelty phase. The emphasis has now shifted to the more practical aspects of implementing AI technology. That a system implements AI is no longer impressive in and of itself. The question becomes: What can this AI system do for me? How can it improve my physical security stance? We asked our Expert Panel Roundtable: How is artificial intelligence (AI) transforming physical security?
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
Products


White papers
Access control: The enterprise buyer's guide
Download
A step-by-step checklist for choosing an intercom system
Download
The wireless access control report 2023
DownloadCybersecurity in keyless access management
Download
Wireless Access Control eBook
Download
Wireless security: Cut costs without cutting corners
DownloadMaking your surveillance cyber secure
Download
How to keep students safe on campus
Download
Network Security Redefined: IP-Enabled Access Control
Download
Mobile Access - What you need to know
Download
The evolution of cards and credentials in physical access
Download

Videos
Wireless security: Manufacturers & Suppliers
- ASSA ABLOY - Aperio® Wireless security
- Dahua Technology Wireless security
- CLIQ - ASSA ABLOY Wireless security
- Honeywell Security Wireless security
- DSC Wireless security
- Climax Technology Wireless security
- Ajax Wireless security
- Senstar Wireless security
- Vanderbilt Wireless security
- Visonic Wireless security
- ASSA ABLOY Wireless security
- OPTEX Wireless security
- Pyronix Wireless security
- Verkada Wireless security
- Bosch Wireless security
- Hikvision Wireless security
- Kantech Wireless security
- RISCO Group Wireless security
- D-Link Wireless security
- Paxton Access Wireless security
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
