Products and Systems: Is a Drone Right for Your Perimeter Security? In Focus: AI Making Access Control Smarter and Faster






Products and Systems: Is a Drone Right for Your Perimeter Security? In Focus: AI Making Access Control Smarter and Faster
We help you digitalize and future-proof your buildings with a wide range of access solutions meeting your individual needs, supporting your move from the mechanical to the digital world. We are experts in access. With us, you digitalize with confidence.
Professional media for complete security solutions
Management
Mahir Hodžić, General Manager mahir.hodzic@asmideast.com
Adis Hodžić, CEO adis.hodzic@asmideast.com
Editorial Staff
Mahir Hodžić, Editor-in-Chief mahir.hodzic@asmideast.com
Orhan Hadžagić, Associate Editor orhan.hadzagic@asmideast.com
Emily Lin, Contributing Editor Emily.Lin@taiwan.messefrankfurt.com
Mirza Bahić, Journalist editorial@asmideast.com
Nermin Kabahija, Journalist editorial@asmideast.com
Art Staff
Sanel Palislamović, Art&Design Editor sanel.palislamovic@asmideast.com
Nelmedin Kolubara, DTP&Art Design dino.kolubara@asmideast.com
Sales Amar Pap, Business Development Manager amar.pap@asmideast.com
International Sales Israel Gogol, International Sales Director Israel.Gogol@taiwan.messefrankfurt.com
International Associates Qatar – Mirsad Selimović, mirsad@techman.qa
a&s Middle East offers the latest news and insights on video surveillance, access control, intrusion detection, fire alarm, mechanical protection, man guarding, cyber security, artificial intelligence, IoT, big data, smart homes and buildings, industrial automation, information, communication technology to Middle East region professional channel players.
a&s Middle East is part of the media network of the Messe Frankfurt Ltd – Taiwan Branch, which offers several media platforms — asmag.com and a&s magazines, published in English, traditional Chinese, and three other languages, providing the most comprehensive industry trends, product, and supply chain information. The total annual circulation is approximately 515,000 copies around the globe. a&s Middle East is published 6 times a year, Jan/Feb, March/ April, May/June, July/August, Sept/Oct, and Nov/Dec.
Payment Instructions
Annual subscriptions are payable in USD, EUR, or AED. Subscription inquiries per your request.
EUR: AE340400000653005131002
Account No. 0653005131002
USD: AE070400000653005131003
Account No. 0653005131003
AED: AE610400000653005131001
Account No. 0653005131001
Copyright Statement
© Copyright by Privus Agency Ltd. All rights reserved. Any republication, copying, redistribution, or reproduction of the magazine in any form, including electronic, without the prior written consent of the publisher, is prohibited. Advertisers are solely responsible for the content of advertising material. The publisher bears no responsibility regarding possible legal, patent, content, or brand disputes of the advertiser.
Legal Disclaimer
The information in this magazine has not undergone any formal testing by Privus Agency Ltd. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While this information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments.
Corporate Address
Privus Agency FZ-LLC
JT010006, Al Shohada Road, Ras Al Khaimah, UAE
Tel: +971 58 983 4258
Web: www.asmideast.com
Marketing: marketing@asmideast.com
Security is no longer about reacting. In today’s landscape, intelligence precedes action, and real-time, contextual, and predictive data has become the new perimeter.
This issue opens with a compelling conversation with the COO of a leading close protection firm, who offers insight into how the nature of their work has evolved. “Not long ago, our work was mostly reactive; something would happen, and we’d respond,” he notes. “Today, with the right tools, we can anticipate patterns, detect anomalies, and adjust routines based on immediate response data.” It’s a shift from protection to preemption, from shielding clients from threats to navigating an increasingly complex social, political, and legal terrain.
That same forward momentum defines much of the security industry in 2025. Our feature on AI in access control explores how machine learning is now being deployed at the very edge of identity verification through biometric, voice, and agentic intelligence systems. Integrators and vendors are moving fast, pushing the boundaries of what access control can do. Still, as the technology matures, so too do the questions surrounding privacy, bias, and systemic trust.
Meanwhile, another frontier has taken to the skies. Once viewed as an emerging support tool, drones have quickly become central to perimeter defense. As detailed in our article on aerial systems, we are no longer simply monitoring fences from above. We are building autonomous ecosystems that can respond, reposition, and even make decisions without human intervention.
Together, these stories signal an industry no longer content with surveillance alone. The future of security lies in prediction, orchestration, and adaptive action.
Please visit our official website www.asmideast.com and select ‘Subscribe Now’ option under THE MAGAZINE menu.
Subscription includes all six editions.
Digital edition is FREE and readily available at the official website.
Effectively protecting people and property from fire can be complex. Advanced simplifies the challenge without compromising on safety.
Whether you need powerful networking, smoke control and fire audio for large-scale UL projects; extinguishing control and fire system redundancy for critical sites; or fast, fuss-free EN solutions for smaller, wireless installations, Advanced brings you fire safety peace of mind.
Initiative launched by Qatar’s National Cyber Security Agency (NCSA) is transforming digital education across the country and earning global recognition.
The “Educational Cybersecurity Curricula” project has been deployed in 433 schools spanning public, private, community, and special-needs institutions.
Dalal Al Aqeedi, Assistant Director of the Policy and Strategy Department at NCSA, highlighted the program’s substantial impact. “Hundreds of schools are actively applying the curriculum, and more than 583,000 students globally have accessed its digital platform,” Al Aqeedi told Qatar TV.
The curriculum, available via open-access digital tools, incorporates interactive educational videos, posters, and infographics, as well as culturally inspired learning scenarios that emphasize Qatari identity.
Its mission is to equip young learners with the knowledge to navigate the digital world safely and responsibly. Students learn how to identify online threats, protect personal data, and adopt secure internet practices—skills that are increasingly vital in today’s digital-first society.
The initiative’s reach is extending beyond borders. Kuwait has announced plans to implement Qatar’s model starting next school year, marking a significant moment of regional collaboration.
The project recently earned top honors at the World Summit on the Information Society (WSIS), underscoring its significant
contribution to sustainable development through the use of ICT. Al Aqeedi emphasized that this achievement reflects Qatar’s growing global reputation in digital safety and education: “The award is a testament to our commitment to nurturing safe, informed digital citizens, especially among youth.” n
The Dubai Police’s Cybercrime Department, part of the General Department of Criminal Investigation (CID), has launched an educational online platform dedicated to raising awareness about cybercrime. It provides valuable awareness information in both Arabic and
English, focusing on prevention strategies, recognizing fraudulent tactics, and ways to avoid them.
Major General Harib Al Shamsi, Deputy Commander-in-Chief for Criminal Affairs, stated that the launch of the awareness platform aligns with the directives
of His Excellency Lieutenant General Abdullah Khalifa Al Marri, Commanderin-Chief of Dubai Police. “This initiative underscores a commitment to enhancing awareness of cybercrime, thereby improving safety and security within the community,” he added.
He noted, “Awareness is the first step in preventing all types of crime, including cybercrime. As reliance on technology, digital tools, and artificial intelligence continues to grow, it is crucial to stay ahead of these advancements to protect the community from fraudsters and other threats.”
The platform features a section called ‘Reporting and Recovery’, which guides users on reporting cybercrimes and the steps to take if they become victims of fraud. It also offers advice on restoring cybersecurity after a device breach, providing tailored guidance for residents and tourists, as well as specific recommendations for businesses and government employees. n
As part of its comprehensive digital transformation strategy, Dubai Electricity and Water Authority (DEWA) continues to scale up the adoption of artificial intelligence (AI) technologies across its operations, particularly in energy distribution. This initiative aims to improve operational efficiency and enhance service quality and reliability. Central to this transformation is DEWA’s smart grid, backed by AED 7 billion in investments through to 2035, helping to ensure seamless, integrated and round-the-clock services.
HE Saeed Mohammed Al Tayer, MD & CEO of DEWA, noted that DEWA’s Distribution Network Smart Centre analyses over 15 million units of data collected daily from the distribution network, converting this data into insight reports and interactive dashboards to support data-driven decision-making. The centre also leverages Big Data, AI and machine learning to provide diagnostic and analytical services, thereby enhancing immediate, proactive maintenance responses and promoting customer satisfaction.
“Our projects and initiatives contribute to
consolidating Dubai’s position as a globally leading city in adopting AI solutions and advanced digital technologies. Deploying AI in the energy distribution sector is part of our efforts to enhance the efficiency of the smart grid and strengthen our operational readiness,” said Al Tayer.
By the end of 2024, there were sixty-nine 33kV substations and 45,317 medium-
voltage (11kV and 6.6kV) substations. To keep pace with Dubai’s growing electricity demand driven by economic and urban development, DEWA deployed 1,202,411 smart electricity meters and 1,103,901 smart water meters across the emirate. With 100% of customers using smart meters, this supports DEWA’s smart electricity and water networks. n
Saudi Arabia has unveiled Pulse Wadi, a pioneering district poised to become the Kingdom’s answer to Silicon Valley. Backed by a substantial investment of approximately SAR 12.1 billion ($3.2 billion), the district embodies the nation’s commitment to cybersecurity, innovation, and sustainable urban development as part of its Vision 2030 initiative. Developed by the global architecture and design firm LWK + PARTNERS in collaboration with key governmental bodies, Pulse Wadi spans an expansive 600,000 square meters, boasting a gross floor area of 1.14 million square meters. Located near Riyadh’s national infrastructure network, it’s purpose-built to host high-tech industries and digital research institutions within a future-ready ecosystem.
The district will feature two iconic headquarters, cultural centers, and a robust cyber-research community. By blending advanced technology with heritage archi-
tecture inspired by Salmani principles, Pulse Wadi represents a fusion of tradition and innovation.
Inspired by Wadi Hanifa, the master plan integrates a lush “green spine,” with over 60% of the district devoted to eco-friendly spaces. Urban metabolic technologies, electric vehicles, autonomous taxis, and pedestrian-friendly networks support a
lifestyle of innovative, sustainable mobility. At its heart lies the Central Wadi Plaza— a multifunctional civic space designed to host inclusive events and honor Najdi culture. Retail, recreational, and dining zones seamlessly connect with the surrounding tech infrastructure, making Pulse Wadi not just a hub for innovation but also a vibrant community space. n
Your information belongs to you alone and cannot be transferred
With from XPR , every card access key is generated through an irreversible diversification process, making it distinct and unique.
To prevent spoofing, the card’s data is thus ENCRYPTED, SEALED, AND ERROR-CHECKED. This process is only visible to the reader and the production card encoding system.
The XPRO readers are fully compatible with our Xsecure encryption solution. Combine sleek design, high performance, and advanced security.
New owner, new company name: the sale of Bosch Group’s security and communications technology product business to European investment firm Triton has been successfully completed. With all necessary clearances secured, KEENFINITY Group will operate as an independent company within the Triton portfolio, effective yesterday.
“We are excited about our future as a standalone com-
pany and convinced that the partnership with Triton brings us the opportunity to realize our full potential,” says Peter Loeffler, CEO of Keenfinity. “Our renowned brands exemplify our dedication to quality, reliability, and innovation, laying a solid foundation for future growth. With a global presence, excellent products, and a dedicated team we will continue to focus on customer expectations and evolving market requirements. “
Keenfinity is the powerhouse behind globally recognized, industry-leading brands, ready to harness their legacy of quality, reliability, and technological excellence to explore new opportunities in the global security and communications technology markets. The company’s offerings include cutting-edge intelligent video systems, advanced access control and intrusion alarm technology, as well as communication systems from the prestigious Bosch, Electro-Voice, Dynacord, RTS, and Telex brands. All products are developed and manufactured by Keenfinity. The four manufacturing facilities and adjacent distribution centers in Straubing in Germany, Ovar in Portugal, Hermosillo in Mexico, and Zhuhai in China provide global production flexibility across Europe, the Americas, and China.” n
The Kingdom of Saudi Arabia continues its international leadership in cybersecurity, maintaining the first position in the global ranking released by the IMD World Competitiveness Yearbook’s cybersecurity indicator for 2025. This top ranking is a direct reflection of the unwavering support and guidance provided to the Kingdom’s cybersecurity sector by the Custodian of the Two Holy Mosques, King Salman bin Abdulaziz Al Saud, and His Royal Highness Prince Mohammed bin Salman bin Abdulaziz Al Saud, Crown Prince and Prime Minister. Their vision propelled Saudi Arabia to achieve leading positions year after year across various international indicators. This includes the Kingdom’s classification as Tier 1 – “Role-modelling” in the Global Cybersecurity Index 2024, published by the UN specialized agency, the International Telecommunication Union (ITU). This success is part of a broader series of achievements since the adoption of the leadership’s insightful and proactive approach to establish a comprehensive cybersecurity sector. This holistic approach integrates both security and development dimensions, encompassing local and international levels.
The Saudi cybersecurity ecosystem has seen remarkable development since the establishment of the National Cybersecurity Authority (NCA) as the Kingdom’s specialized and national authority for cybersecurity affairs and the establish-
ment of the Saudi Information Technology Company (SITE) as its strategic and technical partner. These two pillars are fundamental to the Saudi cybersecurity model that has significantly strengthened national cybersecurity posture, localized priority technologies, and enhanced information sharing and international cooperation. n
93% of organizations that moved to a unified platform saw a decrease in compatibility issues across their security system. This is why our Security Center platform excels. It delivers a cohesive operating picture through modules that were built as one system. So, whether you’re securing an airport, a parking structure, a multi-site enterprise, public transit, or an entire city, you can access all the information you need in one place. This is unification.
The Saudi Data and Artificial Intelligence Authority (SDAIA) has become the first government entity in the Middle East to receive CREST certification, a globally recognized cybersecurity accreditation.
sessment. It also strengthens the Kingdom’s position as a regional leader in cybersecurity and supports the goals of Saudi Vision 2030.
Officials credited the achievement to con-
The certification reflects SDAIA’s adherence to international best practices in areas such as penetration testing, incident response, and vulnerability as-
tinued support from Crown Prince Mohammed bin Salman, who chairs SDAIA’s board, and emphasized that this milestone highlights the Kingdom’s growing
role in secure data and AI infrastructure. The CREST certification is a globally recognized standard in cybersecurity. It grants accreditation to organizations that rigorously adhere to its require-
ments, particularly in procedures, technologies, and governance related to cybersecurity controls and their professional application. n
The average cost of a data breach in the Middle East has declined by 18% over the past year, dropping to $7.29 million, according to IBM’s latest Cost of a Data Breach Report. The decrease is largely attributed to increased investment in AI-powered security tools, encryption technologies, and DevSecOps practices.
Despite the overall drop, the financial sector remains the most affected, recording average breach costs of $9.18 million, followed by the energy and industrial sectors at $8.64 million. Lost business continues to be the largest cost component, accounting for nearly $3.14 million per breach, while detection, response, and notification add significant additional expenses.
The report also highlights growing challenges, including security environment complexity, breaches involving IoT and OT systems, and cybersecurity staffing shortages—each adding between $220,000 and $235,000 to the average cost per incident.
On a positive note, the region is leading globally in securing AI systems. Around 41% of organisations in the Middle East use access controls for AI, compared to a global average of just 3%. Additionally, 38% have formal AI governance in place.
“The region’s bold AI ambitions are paying off in fewer, less costly breaches,” said Saad Toma, General Manager, IBM Middle East & Africa. “Continued investment in governance, tools, and talent will be key to sustaining this progress.”
The 2025 Cost of a Data Breach Report draws on analysis of over 600 breaches globally, including organisations in Saudi Arabia and the UAE, between March 2024 and February 2025. Conducted by Ponemon Institute and sponsored by IBM, the report is based on over two decades of research and data from nearly 6,500 real-world breaches. n
5 - 6 November 2025,
Victor Bomfim, Aldra Security COO
In an era where security operations span volatile regions, critical infrastructure, and high-profile individuals, the demands on protection professionals have never been greater. ALDRA ALAMEEN stands at the forefront of this evolving landscape, merging military precision with private sector adaptability. In this exclusive interview, Victor Bomfim—himself a product of both armed forces and law enforcement—shares how the company approaches everything from executive protection and diplomatic security to crisis response and advanced training
n By: Orhan Hadžagić orhan.hadzagic@asmideast.com
a&s Middle East: With a background in law and public security, how do you see the evolving intersection between cybersecurity threats and legal frameworks in the Gulf region, and what role does a company like ALDRA ALAMEEN play in navigating these challenges for its clients?
Victor Bomfim: This intersection has become a critical and, honestly, still somewhat nebulous point in the security landscape. On one hand, digitalization has been advancing by leaps and bounds, helping vital sectors develop faster and more efficiently. But on the other hand, it creates openings for all kinds of threats - from cyberattacks and espionage to sabotage and information warfare. And this is where a major challenge emerges - one that goes beyond technology and reaches into legal and strategic territory. Security-related legislation is constantly playing catch-up with evolving threats, and in that race, gaps inevitably appear. Things become even more complex when we’re dealing with cross-border crimes, ultrasensitive data regulation, or perpetrators operating in hybrid environments. That’s exactly where we come in. Our role is to bridge these three worlds: the client’s day-to-day operations, technological innovation, and the constantly evolving regulatory landscape. We don’t just deliver security solutions - we guide clients in strategic decision-making, based on intelligence and solid governance. Our work spans everything from advising on internal policies that make sense in the current scenario to setting up coordinated responses to serious incidentsalways combining local realities with international standards. Because, at the end of the day, modern security is just that: a game of convergence. And to play it well, you have to think legally, act technically, and react tactically - all at the same time.
a&s Middle East: Having served in both the Army and Police forces, how has your military background shaped the way you structure training and preparedness programs at ALDRA ALAMEEN?
Are veterans and ex-military personnel still considered assets in today’s private security sector?
Victor Bomfim: My history within the Armed Forces and the Police has always been closely linked to the training of people. From the beginning, I was involved in training professionals - from early-stage soldiers to special forces operators - in very advanced courses. This gave me a very clear understanding of how the entire training cycle works: from selection, through the construction of technical curricula, to knowing exactly what works - or fails - under real pressure.
At ALDRA ALAMEEN, this background has become the foundation for everything we do in the area of training and readiness. Our model is based on doctrine, but with the flexibility that the private sector requires. You can’t apply a rigid military manual in an international corporate environment, where each operation has its own reality - whether in conflict zones or in the protection of sensitive assets such as embassies, offshore platforms, or large global corporations.
What the barracks taught me - and what I carry to this day - are five core pillars: discipline, resilience, technical excellence, leadership under pressure, and, perhaps most importantly, adaptability. Especially coming from special operations, I learned that there is no such thing as a standard mission. Each project is a universe: the country, the culture, the language, the type of threat - everything changes. Leadership, in this context, must maintain excellence regardless of the scenario. And this requires operational thinking that is agile, strategic, and well-grounded.
Now, regarding veterans, I have no doubt they remain highly valuable assets in the sector. These professionals carry values that are increasingly rare: loyalty, resistance to pressure and stress, and mission focus. But of course, the civilian market has its own rules. The transition requires humility and adaptation. I myself started at ALDRA ALAMEEN performing very operational tasks. Over time, I grew - leading teams, managing projects, and eventually taking on a more strategic role. What helped me evolve in the sector was one key factor: mentoring. I was fortunate to be personally guided by our CEO, Lario Lovric, who has extensive experience in international security. This greatly accelerated my adaptation. To-
day, we make a point of replicating that model within the company. We create development tracks that truly harness the potential of veterans. Many of them are now leading critical projects - not only because of their experience, but because of the mindset they bring. Ultimately ultimately , what we’re looking for are operators capable of making decisions in high-stress environments, with ethics, preparation, and a strong sense of mission. That’s the kind of professional the modern security market demands - and that’s exactly the kind of people we select and train to work with us.
a&s Middle East: ALDRA ALAMEEN operates across high-risk and sensitive environments such as Oil & Gas and government sectors. What are some of the biggest operational challenges you face when it comes to managing security in these sectors?
Victor Bomfim: When we talk about protecting assets in the Oil & Gas sector or within government operations, we’re not just talking about security—we’re dealing with structures that, if compromised, could impact the entire stability of a country. These are high-value strategic environments, often located in politically unstable regions, with territorial disputes, the presence of hostile groups, and frequently in remote areas where response must be fast and effective, even with limited resources.
The major challenge is ensuring that all this protection operates without disrupting the client’s operation. It may sound simple, but it’s a delicate balancing act. We need to implement robust measures—access control, active surveillance, contingency protocols—without interfering with the client’s routine or causing friction with production, logistics, or strategic operational choices. And this is only possible when there’s seamless coordination between physical security, field intelligence, and digital response. As I said before, threats today come from all directions: sabotage, terrorism, cyberattacks, disinformation… It’s a multidimensional battlefield.
At ALDRA ALAMEEN, we tackle this with multidisciplinary teams that breathe complexity. Of course, we rely on stateof-the-art technology—but at the end of the day, what truly makes the difference is the quality of our human resources on the ground. People trained to act with
precision, in high-stress environments , with situational awareness and a strong sense of responsibility.
Another key factor is interoperability. We maintain constant communication with local authorities, armed forces, civilian agencies, and the managers of the assets we protect. This minimizes miscommunication, helps anticipate problems, and ensures that any response, when required, is fast and well-coordinated. For me, it all comes down to three words: resilience, anticipation, and adaptability. Without these three pillars, it’s impossible to operate effectively. The environment changes every day, and the threat doesn’t send a warning. So what we deliver to our clients is this: a security structure that works under pressure, adapts in real time, and—above all—allows the operation to keep running safely, stably, and without surprises.
a&s Middle East: Your biography highlights successful missions in conflict zones. How do you translate those experiences into corporate strategy and leadership within a private multinational security firm?
Victor Bomfim: My experience in conflict zones has changed the way I see almost everything—especially when it comes to leadership and strategy. On the ground, you quickly realize that even the best plan in the world can fall apart in seconds. In that environment, staying calm, making decisions during high-intensity situations, and adapting to the unexpected are no longer optional—they’re basic survival skills. This mindset, heavily influenced by special operations doctrine, is something I intentionally brought into the company. In practice, this translates into a very straightforward operational culture: absolute focus on the mission, decentralized initiative, and small but highly efficient teams prepared to decide and act quickly, based on real-time situational awareness. Our command model is clear in its objectives, but it gives tactical freedom to those on the ground. This allows for speed without losing control. Here, no one waits for orders to act— each operator knows what needs to be done because they’ve been trained to think, not just obey. And that only works with preparation and mutual trust. Another value I brought from the field— and developed further alongside Mr. Lario—is the importance of presence-based
a&s Middle East: In addition to the energy sector, ALDRA ALAMEEN also works to protect NGOs, multinational companies, and critical infrastructure in high-risk countries. How do you manage missions involving evacuations, crisis support, and diplomatic protection?
Victor Bomfim: Evacuation, crisis response, and diplomatic protection missions are among the most delicate and demanding operations we conduct—and precisely for that reason, there’s no room for improvisation. These missions typically unfold under extreme pressure, with short decision windows and variables that are completely out of our control: institutional collapse, armed insurgency, natural disasters, hostile populations, logistical breakdowns. It’s the kind of scenario where every minute counts, and every mistake is costly.
We strive to integrate these missions into structured plans long before a crisis begins. With sensitive clients such as international NGOs, multinationals, and embassies, we work with predefined risk scenarios. We identify safe zones, map out alternative routes, establish agreements with local partners, and maintain layered extraction protocols. So when chaos erupts, the plan is already in place—our job is to execute it with precision.
Our specialized cells are composed of operators with real-world conflict zone experience. These are multidisciplinary teams that combine armed security, intelligence, logistics, and crisis communication. Each team operates with tactical autonomy, which allows for rapid and effective response even when conditions shift by the hour.
Another key element is contextual intelligence. We don’t just monitor physical threats—we follow the social, political, and legal landscape. We rely on local sources, predictive analytics, and direct engagement with authorities. This gives us the ability to make surgical decisions in volatile environments.
In diplomatic protection, the balance becomes even more sensitive. Security must be ensured without compromising neutrality or the image of the mission. We act with extreme discretion, full interoperability with local forces, and always under protocols rooted in containment, defensive posture, and, if necessary, strategic evacuation. The institutional stability of the client is treated as an absolute priority. In the final analysis ultimately , our directive is simple and direct: protect lives and restore operational continuity in the shortest time possible.
leadership. I don’t believe in commanding by email. I make a point of being present, talking to the leaders of each unit, understanding where the bottlenecks are, and above all, ensuring that the company’s culture is being applied consistently. That creates respect, engagement, and more accurate decisions—because they’re based on reality, not on PowerPoint slides or Excel spreadsheets. There’s another point that I believe is perhaps the most valuable of all: conflict zones teach you that the human factor is sovereign. State-of-the-art equipment and sophisticated systems help—but without a well-trained, well-led, and purposedriven team, nothing works. That’s why investing in people is a top priority for us. We hire talent, but we also shape that talent within our culture—with doctrine, discipline, and a strong sense of mission. Clarity of purpose, leadership with moral authority, and responsible freedom at the front lines are values I learned in the field, refined at ALDRA ALAMEEN, and continue to apply every day.
Close Protection Is a Mission—Not a Job
a&s Middle East: Close protection and authority-level security require more than just operational precision— it’s also about psychological readiness. How do you ensure your personnel
are equipped mentally and ethically for such roles?
Victor Bomfim: You’re absolutely right. Protecting an executive or a public authority—whether in normal conditions or high-risk scenarios—goes far beyond knowing how to handle equipment or execute a technique with precision. It’s about being constantly involved in a mission of enormous responsibility, where any slip, no matter how small, can compromise someone’s safety, image, or even life. This demands psychological preparation, maturity, environmental awareness, and an ethics that is impervious to ego.
Our process begins with selection. We look for operators with solid track records—but we don’t rely on résumés alone, because as we often say: paper can say anything. We want to understand the person behind the qualifications and the interview. We assess self-control, emotional intelligence, ethics, and the ability to exercise judgment under pressure. You simply cannot put someone unstable or impulsive in such a sensitive position.
Then comes adaptation to the role. We blend special operations doctrine with our own executive protection protocols, all tailored to the legal and cultural context of each country where we operate. We seek operators who have experienced “stress inoculation”—whether in
real missions or high-fidelity training— people who have been exposed to chaotic scenarios and have a brain trained to stay clear when things get rough. That’s what enables our professionals to make the right call when there’s zero margin for error.
Another essential factor is continuous evaluation and training. Our operators undergo regular updates in physical conditioning, self-defense, and armed combat, because unpracticed technique becomes a liability. Beyond that, we demand constant situational awareness— operators must fully understand the context they’re in, whether it’s a diplomatic mission, a government event, or the daily routine of a high-profile executive. We also work with lean, highly cohesive teams. Close protection doesn’t function with large structures or over-command. It works with professionals who operate in full coordination, who read the environment, and who know how to take initiative when needed—without depending on micromanagement. That requires maturity, mutual trust, and intense preparation.
a&s Middle East: The Gulf region is rapidly adopting smart technologies. How does ALDRA ALAMEEN integrate innovation and digital tools in traditional security operations, especially in threat analysis and incident response?
Victor Bomfim: Nowadays, the line be-
Not long ago, our work was mostly reactive—something would happen, and we’d respond. Today, with the right tools, we can anticipate patterns, detect anomalies, and adjust entire routines based on concrete, immediate response data
tween what’s physical and what’s digital is very thin—because everything is connected. At ALDRA ALAMEEN, we see technology as a true force multiplier. It enhances our ability to predict, react, protect, and train with far greater efficiency. And here in the Gulf region, the environment is especially fertile for innovation. Governments and major companies are heavily investing in automation, intelligent systems, and full operational integration. We follow this transformation closely. We use predictive analytics platforms that help us identify outlier patterns, anticipate threats, forecast social tension points, and even optimize routes using on-the-spot updated data. We also operate an integrated system that tracks human resources, training, and logistics—keeping our operations lean and bottleneck-free. This training management component is something I had never experienced in the police or military. It allows us to monitor each trainee’s technical development, identify achieved objectives, and match profiles to tasks more precisely. This significantly impacts service execution and response time. Additionally, our systems are designed to interface with those of our clients and local authorities—ensuring smoother integration and faster response when every second counts.
That said, there’s one point I always emphasize to our teams: technology must serve the operator, not the other way around. Even in a digitized environment, our focus remains on the human element. Tactical judgment, ethical judgment calls, and operational awareness are still irreplaceable. The system can show you what’s happening—but it’s up to the professional on the ground to decide what to do with that information. We widely use smart technologies, but we use them with clear purpose. They don’t just boost performance—they elevate security to a level that was once unthinkable.
a&s Middle East: You’ve been recognized for acts of bravery and strategic excellence. In your opinion, how important is leadership under pressure in today’s private security industry, and can it be taught or is it innate?
Victor Bomfim: Leading under pressure in our world isn’t a differentiator— it’s a prerequisite. Anyone who works in security knows: in many situations,
a&s Middle East: The company provides training for both state forces and private sector operators. What is the philosophy behind these training programs? And how do you ensure that a professional is technically and ethically ready to operate in extreme environments?
Victor Bomfim: The foundation of our philosophy is simple but profound: we’re not just here to teach techniques—we’re here to train professionals who can make critical decisions under pressure. People who, even in chaos, are able to maintain clarity, discernment, and responsibility. This applies equally to state forces and private sector operators. The scenario may change, but the requirement is the same: those on the ground must be ready to act.
Our training model is inspired by special forces doctrine, but adapted to the reality of each mission. We work on three main pillars. The first is technical and physical: endurance, mastery of equipment and tools, coordinated movement, and tactical procedures. The second is cognitive: decision-making in high-stress environments, situational awareness, and tactical reasoning. And the third—and perhaps the most critical—is behavioral: discipline, self-control, resilience, and awareness of the impact of one’s actions.
A key differentiator in our method is the use of stress inoculation. We create realistic simulations that place the operator in front of real dilemmas: moral conflicts, deliberate operational failures, loss of command, ambiguous orders. We want them to feel the pressure before they face it in the real world—because in the field, there’s no space for panic or emotional improvisation.
And one point we do not negotiate: ethics. For us, the security operator is a stabilizing agent. They must have posture, understand human rights, international laws, rules of engagement, and the limits of force. All of this is present in our training. An operator who completes our programs leaves not only technically competent, but fully aware of the responsibility they carry.
This approach applies at all levels. When we train state forces, we reinforce doctrine and promote interoperability. When we train private operators, we shape a profile aligned with the corporate environment—without compromising on rigor. In all cases, the goal remains the same: to deliver a complete professional, someone who knows how to act, think, and decide in extreme scenarios, with technical skill, moral integrity, and mission clarity.
you have just seconds—sometimes not even that—to make a decision that can change the outcome of an entire operation. And when you’re in a high-risk environment, there’s no time to “wait and see.” Either you react with clarity, or the consequences can be enormous—on every level.
Now, is this ability something you’re born with? Look, some people do have a sharper instinct for it, yes. But in my experience, what truly makes the difference is how much you train and how much you develop. Leadership under pressure is something that can—and should—be cultivated. It’s a mix of practice, values, reflexes, and, most of all, mental readiness. You can’t improvise in this kind of role. When chaos takes over, that’s when the real leader steps forward—the one who keeps the team cohesive and focused on the mission,
even when everything else is spinning out of control.
But that alone isn’t enough. Leadership is also about culture. Inside the company, leading means being close. It means guiding, correcting, really listening, and being available—especially in difficult moments. I personally maintain direct contact with all operational leaders. I’m not the kind of commander who stays behind a desk. I make a point of spending time on each project, feeling the demands firsthand, understanding the real difficulties, and staying connected to the “men at the front line.”
Another thing we value deeply is developing leaders from within. We’re constantly watching for those who show leadership potential. And it’s not just about their technical background—we evaluate judgment, posture, ethics, communication clarity, experience, and how
well they understand the company’s culture. Because in the end, it’s not only about knowing what to do, but being able to make the right decision under pressure—with responsibility and full awareness of what the company expects from its teams.
And there’s one point I consider crucial, which often goes unnoticed: leadership isn’t a one-way street. The weight of responsibility can’t—and shouldn’t—fall solely on those who lead. Subordinates also play a key role in the process. And that’s where culture comes in again. In high-risk environments, there’s no room for misalignment. Any disconnect between client, company, leadership, and team can trigger failures with serious consequences. That’s why the organizational culture has to be alive, clear, and shared. Every professional must understand their role in the system—not as a passive executor, but as someone who contributes, supports, and collaborates with the leader toward a common goal.
a&s Middle East: Given the global ambitions of ALDRA ALAMEEN, how do you manage the balance between maintaining a strong local presence in the Gulf and expanding international operations without compromising quality and values?
Victor Bomfim: Balancing global growth with strong local roots is, without a doubt, one of the greatest challenges for any serious company. And for us, the answer was clear from the start: there’s no point in expanding if it means diluting what makes us who we are. Our logic is simple—every new project, whether in the Gulf or on the other side of the world, begins with one core question: how do we ensure that our values are embedded in every decision and every action on the ground?
The answer lies in three non-negotiable pillars: strong culture, present leadership, and replicable doctrine. Our culture goes far beyond procedures—it shapes how we think, act, and react in time-critical operations. And that’s not something you can improvise. It requires consistent training and a selection process that prioritizes character, alignment, and mindset over just a technical résumé. Here in the Gulf, we maintain a strong presence because we know the terrain, we respect local norms, we understand cultural nuances, and we actively engage with both governments and busi-
We don’t just monitor physical threats—we follow the social, political, and legal landscape
nesses. But we never compromise on our core principles: loyalty, competence, and commitment. That consistent posture is what has given us room to grow with stability. When it comes to international expansion, our strategy is to take our culture with us—we don’t outsource that. Every new contract is closely monitored. We’ve created an environment where even an operator working thousands of miles from our base knows exactly what’s expected, because they’ve been trained in the same language and under the same standards. Our doctrine is solid, yet adaptable. Supervision is constant, but respectful. And that creates a kind of standardization that holds, even across diverse environments.
We also maintain a continuous training system that includes cross-border exchanges. The same operator managing a critical site in the Gulf today might be on a diplomatic mission in Africa tomorrow—and still know exactly how to act. Why? Because they’ve been formed
within the same culture of excellence and accountability.
For us, growth isn’t about scale—it’s about coherence. Expanding doesn’t mean copying and pasting; it means adapting without losing our essence. a&s Middle East: As someone with deep insight into intelligence and protective operations, how do you see the role of predictive risk analysis evolving with the use of AI and big data?
Victor Bomfim: The arrival of artificial intelligence and big data has truly changed the game in how we approach security. Not long ago, our work was mostly reactive—something would happen, and we’d respond. Today, with the right tools, we can anticipate patterns, detect anomalies, and adjust entire routines based on concrete, immediate response data. It’s a fundamental shift in mindset: we’ve moved from “reacting” to “preventing with precision.”
Predictive analysis has become one of the pillars of our strategic model. We work
At the end of the day, modern security is just that: a game of convergence. And to play it well, you have to think legally, act technically, and react tactically - all at the same time
with platforms that aggregate multiple data sources in real time, processed by AI to generate alerts, simulations, heat maps, and risk scenarios. This allows us, for example, to reposition resources ahead of time, reroute safely, or review protocols before a threat materializes. We’ve also developed internal solutions tailored to the realities we face: auditing systems, incident tracking, access control, field management—all integrated, all behavior- and risk-based. This not only increases efficiency but also enhances transparency and accountability in our operations.
In high-risk areas, this predictive capacity makes a huge difference. If you can forecast an event that might compromise security even a day or two in advance, you’re literally saving lives and preserving strategic assets. That’s what we deliver: anticipation, fast response, and critical thinking based on evidence—not guesswork.
a&s Middle East: Finally, from your experience, what trends do you observe among young men entering the security industry today, what motivates them, and how has the profile of a “security professional” evolved compared to two decades ago?
Our culture goes far beyond procedures—it shapes how we think, act, and react in timecritical operations
Victor Bomfim: The profile of the security professional has changed significantly compared to twenty years ago. Back then, it was common to find operators with a nearly exclusive focus on physical skills, limited technical training, and a reactive mindset—the classic “wait for the problem and then act.” Not that this isn’t important today—it absolutely is, and that’s why experienced professionals remain highly valued. But nowadays, the industry demands multi-skilled individuals: people who understand technology, communicate well, apply refined tactical behavior, and—above all—demonstrate emotional intelligence and strong ethical foundations.
What I see most in the young men entering the field today is a genuine desire to be part of something bigger. They’re not just looking for a job. They’re looking for mission, purpose, belonging. And that’s where one of ALDRA ALAMEEN’s greatest strengths lies. Our motto, “We are ALDRA ALAMEEN,” isn’t just a marketing line—it reflects a living culture of collective spirit, shared responsibility, and pride in what we deliver.
Of course, this new generation brings its own challenges. Many are quick to learn technical content but tend to have a lower tolerance for frustration—and that’s something we need to work on. As leaders, it’s our job to channel that energy, shape the mindset, and transform potential into consistent performance. Our training program goes far beyond operational instruction. We shape behavior and thinking. From day one, each operator understands that we expect discipline, self-control, a sense of responsibility, resilience, and full alignment with the company’s values. We use high-pressure simulations, constant feedback, and place strong emphasis on organizational culture—because, as I’ve said several times in this interview, that’s what sustains performance when pressure hits. That said, we must be careful. While these young professionals have a strong connection to technology—which is a great asset—we need to ensure they don’t become entirely dependent on it. That’s something older operators understand well and can pass down to the next generation.
This new generation comes in hungry for growth—and when that drive is properly guided, it becomes a tremendous advantage. They’re the ones who will renew the industry, bring fresh perspectives, and strengthen everything we’ve built so far. n
AI
Artificial intelligence is rapidly reshaping the access control industry, promising smarter and more autonomous security systems. From biometric authentication at the edge to voice-driven analytics and agentic intelligence, vendors and integrators are racing to incorporate machine learning into security workflows. But even as adoption grows, industry leaders acknowledge that its real potential, along with its risks, is still unfolding
n By: Prasanth Aby Thomas, ASMAG Consultant Editor editorial@asmideast.com
In a market historically dominated by badge readers and mechanical locks, access control systems are now gaining technology-powered capabilities to interpret behavior, automate insights, and detect anomalies. This evolution is influencing everything from how doors are unlocked to how organizations analyze threats across large facilities.
“Artificial intelligence of all kinds is making access control systems faster and smarter,” said Jeffrey Groom and Adam Groom, AI Development team leads at ACRE security and co-founders of REKS.
ai. “Generative AI models, in particular, make access control systems more fluid and responsive by allowing security teams to obtain critical insights from their platforms using unique verbal operational terms and language.”
For instance, a user might say, “Show me all the access denied events across our infrastructure for the last month,” and get an instant, comprehensive report.
“Putting these insights within arm’s reach at any moment using natural language allows security teams to learn from user behavior, detect unusual patterns, and enhance security where anomalies and access failures are most common,” Groom added.
While cloud-based generative models like GPT are gaining popularity in analytics and decision support, edge computing built directly into devices is transforming the front lines of physical security. Suprema, a Korea-based global access control manufacturer, is one of the companies the forefront of this shift.
“All of Suprema’s latest edge AI devices incorporate Neural Processing Units (NPUs) to maximize on-device AI performance,” said CEO Hanchul Kim. “NPUs
process AI workloads faster while consuming less power, making them ideal for edge device applications.”
Suprema’s systems are designed to handle authentication and analytics directly on the reader or controller, eliminating delays and reducing infrastructure needs.
“Suprema’s edge AI technology is able to create lightweight AI engines that efficiently handle vast datasets while preventing overheating and hardware slowdowns,” Kim said. “By integrating advanced NPUs, Suprema delivers biometric authentication directly at the edge— faster and more accurately.”
According to Kim, door-unlock latency is unaffected whether systems use traditional power sources or Power over Ethernet (PoE+). “Most Suprema devices support PoE+, but there is no difference
in door-unlock latency between using a standard power supply and PoE,” he confirmed.
Suprema has focused its development on behavior-based threat detection at the edge. Its on-device algorithm includes capabilities such as people counting, loitering detection, fall detection, and tailgating prevention.
“Suprema’s proprietary on-device AI algorithm…detects threats through abnormal behavior analysis,” Kim said. “Moreover, it enables advanced security monitoring, such as people counting, tailgating detection, blacklist detection, and missing person tracking.”
Suprema’s edge AI technology is able to create lightweight AI engines that efficiently handle vast datasets while preventing overheating and hardware slowdowns
AI can automate the process, allowing [teams] to trim the fat from their day-to-day operations to focus on keeping critical environments safe
The module is available in both embedded and add-on formats, allowing integrators to scale features according to site requirements.
ACRE’s Groom sees similar potential in future deployments but notes the current stage is still exploratory. “Although AI has been the talk of the security industry for many years already, we’ve only just scratched the surface of how we can leverage it to revolutionize security and other workflows for end users,” they said. The benefits of these technologies extend beyond real-time decisions to improving the day-to-day efficiency of security teams. “AI can automate the process, allowing [teams] to trim the fat from their day-to-day operations to focus on keeping critical environments safe,” Groom added. “Historically, security teams had to manually search for the insights they needed.”
Despite the promise, both companies agree that trust remains a barrier. Reliability, consistency, and explainability
are central concerns, especially in highstakes environments like healthcare, education, and critical infrastructure.
“For AI to be considered truly reliable, it must be transparent, accurate, and consistent in how it affects organizations,” said Groom. “That means minimizing false positives, like denying access to someone
who should be allowed, and false negatives, such as letting in someone who shouldn’t.”
Suprema addresses this through safeguards in its firmware and model update process. “If any issue occurs during a firmware update—such as a power interruption or a corrupted file—the device will automatically revert to the previous stable version,” Kim said. “This feature allows customers to confidently perform remote updates, preventing system downtime and protecting against potential malfunctions.”
As biometric systems become more pervasive, regulators are demanding stronger compliance. The EU’s General Data Protection Regulation (GDPR) and the recently passed AI Act both impose strict requirements on data storage, algorithmic accountability, and user consent.
Suprema says it has designed its systems to comply with these frameworks.
“Suprema recently has renewed two important international standard certifications regarding information security management (ISO/IEC 27001) and privacy information management (ISO/IEC 27701),” Kim said.
“All data are encrypted and protected,” he added. “Suprema services are modularized to protect devices and software and prevent integrators from changing settings during installation. There is no need for integrators to undergo complicated training to protect data.”
However, Kim made clear that final compliance lies with the end user. “Suprema also distributes guidelines to help customers safely manage users’ personal information. However, it remains the responsibility of end users to comply with these guidelines and to ensure that servers are managed appropriately.”
Although AI has been the talk of the security industry for many years already, we’ve only just scratched the surface of how we can leverage it to revolutionize security and other workflows for end users
Looking ahead, both ACRE and Suprema expect intelligent systems to assume a more autonomous role in access control. Agentic intelligence, which describes systems that can plan and act with limited human oversight, is expected to gain traction over the next five years.
“Agentic AI refers to artificial intelligence systems that can operate with a degree of autonomy, meaning they can make valuable decisions on behalf of security professionals,” said Groom. “These models will be able to learn what security teams need and then, make decisions, take actions, and adapt without needing constant human oversight.”
While agentic models are still in their early stages, Groom expects increased
adoption as generative tools become embedded deeper into physical security platforms.
Suprema, meanwhile, is focused on preparing the integration channel. “Suprema provides training on new features of its software platform,” Kim said. “Training on installation, maintenance, and technical support is also available upon request. Upon completion of these training programs, participants receive a certification.”
Both companies agree that while advanced automation will transform access control workflows, its success depends on industry-wide commitment to transparency, user education, and responsible deployment.
“AI-driven capabilities will evolve rapidly as new capabilities emerge, but the full range of benefits for security teams will depend on continued development and real-world applications across the industries we protect,” said Groom.
As technology evolves from a back-end tool to a front-line decision-maker, the stakes are rising for accuracy, compliance, and trust. For access control manufacturers, integrators, and end users alike, the road ahead will involve balancing innovation with responsibility, one system at a time. n
While the concept of using drones for perimeter security was gaining traction in 2023, the landscape in 2025 has fundamentally changed. We’ve moved beyond simple aerial surveillance to fully autonomous, AI-driven security operations
n By: Prasanth Aby Thomas, ASMAG Consultant Editor editorial@asmideast.com
For physical security installers and integrators, the question is no longer if drones should be part of a solution, but how to leverage technologies like AI analytics, Drone-in-a-Box systems, and advanced sensor payloads to deliver proactive security and a clear return on investment (ROI). This updated 2025 guide explores the current state of drone security, focusing on the practical integration strategies and new technologies that define a modern, effective UAV program. As technology continues to advance at a rapid pace, physical security has become more sophisticated and effective than ever before. One of the latest innovations in this field is the use of drones for perimeter security.
These unmanned aerial vehicles (UAVs) offer a range of benefits over traditional security measures, including improved coverage, faster response times, and reduced costs. For physical security installers, integrating drones into their security solutions can provide a significant competitive advantage and open up new business opportunities.
In this article, we will explore the benefits of using drones for perimeter security and provide practical guidance on how physical security systems integrators can
leverage this technology to enhance their businesses.
5 advantages of using drones for perimeter security
While there are several advantages to using perimeter security drones, customers must know that not every benefit may apply to every vertical. For example, drones may offer better coverage in some cases,
but if a site is riddled with obstacles in the form of complex buildings, UAVs may find it difficult to operate. Having said that, here are five benefits:
1. Improved coverage
One of the most significant advantages of using drones for perimeter security is the ability to provide wider coverage of the area being monitored. Drones can fly at various heights and angles, enabling them to capture footage from
locations that may be difficult or impossible to reach using traditional security measures. As a result, drones can provide a more comprehensive view of the perimeter and identify potential security threats more effectively. Drones can now leverage on-board AI to autonomously patrol vast perimeters. Instead of a human watching a video feed, the AI analyzes it in real-time, identifying anomalies like a person in a restricted zone at 3 AM, distinguishing them from wildlife, and automatically flagging the event.
2. Faster response times
Drones can respond to security incidents much faster than human security personnel. Once a potential threat is detected, the drone can quickly move to the location and assess the situation, providing real-time information to security teams. This enables security personnel to respond more rapidly and effectively, potentially preventing security breaches or minimizing the damage caused by such incidents. With automated nesting stations (Drone-in-a-Box), a drone can be airborne in under 30 seconds following a perimeter sensor alarm (e.g., a fence break). It autonomously flies to the event location, streams live video with thermal imaging to the VMS, and verifies the threat, allowing security teams to respond with full situational awareness before they even leave the command center
3.
Drones can be a cost-effective alternative to traditional security measures. By
Drones can respond to security incidents much faster than human security personnel
using drones, physical security installers can reduce the need for expensive human resources, such as security guards. In addition, drones can provide 24/7 surveillance, reducing the need for multiple security shifts and reducing overall operating costs. While labor cost savings remain a key benefit, the true ROI in 2025 comes from automation and data. Automated DIAB systems eliminate the need for on-site pilots for routine patrols. Furthermore, drones equipped with LiDAR or multispectral sensors can perform site mapping, infrastructure inspection, and maintenance reports, adding business value far beyond security.
Drones can be deployed quickly and easily, making them ideal for providing security in a range of scenarios. They can be used for event security, construction site security, critical infrastructure security, and many other applications. Additionally, drones can be programmed to follow specific flight paths or patrol specific areas, providing increased flexibility and customization. Modern drone platforms are no longer single-task assets. The same drone that performs a security patrol at night can be equipped with different payloads during the day for thermal roof inspections, stockpile measurement at a logistics facility, or creating 3D models of a construction site. This multi-mission capability dramatically increases the asset’s value.
Drones can be used to provide security in hazardous or hard-to-reach areas, reducing the risk to human security personnel. For example, drones can monitor areas that are prone to natural disasters, such as flood-prone areas or earthquake-prone regions. This can help to ensure the safety of security personnel and reduce the risk of injury or loss of life. Drones act as the first line of defense, allowing operators to assess potentially dangerous situations— from chemical spills and fires to active intruders—from a safe distance. This is especially critical for critical infrastructure sites, where sending a human to an unverified alarm poses a significant risk
Although the advantages may outweigh the disadvantages in many verticals, customers need to remain aware that drones have several limitations. At the end of the day, drones are restricted by several factors and optimizing your security operations around these limitations is essential to achieving the best results.
One of the primary limitations of using drones for perimeter security is the limited flight time. Most commercial drones have a flight time of 20-30 minutes,
While drones offer improved coverage, faster response times, reduced costs, flexibility, and improved safety, they are also limited by their flight time, dependence on technology, weather conditions, privacy concerns, and regulatory constraints
which may not be sufficient for large areas or extended surveillance periods. This means that multiple drones may be required to cover a single perimeter, increasing costs and complexity. However, The 20-30 minute flight time limitation is largely solved by Drone-in-a-Box systems. These robotic nests allow the drone to land, recharge, or even have its battery automatically swapped, enabling true 24/7 persistent surveillance with minimal human intervention
Drones are highly dependent on technology and may be susceptible to system failures, such as signal loss or malfunctioning equipment. This could compromise the effectiveness of the security system and potentially lead to security breaches.
3.
Many drones are highly sensitive to weather conditions, and high winds, rain, or fog can compromise their effectiveness. This means that they may not be suitable for use in all weather
conditions, reducing their overall effectiveness.
The use of drones for security purposes may raise privacy concerns among individuals in the area being monitored. This could lead to legal challenges or a negative public perception of the security system, which could undermine its effectiveness.This remains a valid concern, but technology now provides the solution. Advanced VMS platforms can apply dynamic privacy masking, automatically blurring out windows of nearby residential properties or public areas. Geofencing ensures drones operate strictly within the client’s property lines, providing an auditable record of compliance
The use of drones for security purposes is subject to a range of regulatory constraints, including restrictions on flying in certain areas or operating outside of certain hours. This could limit the effectiveness of the security system or add complexity to its operation. Also, several coun-
tries like the US require commercial drone operators to hold valid licenses, which might further increase operational costs.
In short, the use of drones for perimeter security has both advantages and disadvantages. While drones offer improved coverage, faster response times, reduced costs, flexibility, and improved safety, they are also limited by their flight time, dependence on technology, weather conditions, privacy concerns, and regulatory constraints. Regarding technology, factors to consider also include the type of drone to use. For instance, while remote-controlled drones are popular, several leading companies offer autonomous drones that offer a host of several advantages and disadvantages. Physical security integrators must carefully evaluate these factors before deciding to add drones into their security solutions. With careful planning and implementation, however, drones can provide a significant competitive advantage and help to enhance the effectiveness of security systems. n
The new IDIS Edge AI Camera Plus range takes security and safety to a new level of efficiency for real-time monitoring and incident review
Supercharge your security and safety operations with the IDIS Edge AI Camera Plus range. It features IDIS A-Cut Monitoring and IDIS Deep Learning Analytics (IDLA) Pro event functions - including crowd detection, abandoned object, removed object, fall detection, and violence detection. These new functions enable faster investigations and response times thanks to automatic image cropping, intuitive attribute searches, and advanced automated alerts, as standard.
As cyber and physical security converge, organizations need to choose physical security vendors that align with their information technology (IT) infrastructure to keep people, data, and assets safe. For IT professionals responsible for protecting both digital and physical assets, making the right choice is critical. This checklist outlines what to demand from your next vendor, so your security can meet today’s threats and adapt to tomorrow’s
n By: Orhan Hadžagić orhan.hadzagis@asmideast.com
1. Align security with business and IT strategy
A modern physical security solution should do more than monitor premises. It should be a strategic fit that enhances the broader organizational goals. Look for unified platforms that integrate video surveillance, access control, automatic license plate recognition (ALPR), communications, forensics, and analytics. Solutions that offer centralized management and real-time monitoring foster collaboration across security teams, compliance officers, and IT departments. This alignment informs decision-making and drives operational efficiency. Physical security systems also generate a rich stream of operational data, from facility usage trends to incident patterns, that can help improve safety protocols, optimize resources, and support cross-functional insights.
2. Ensure technical compatibility
A top-tier solution should complement your existing IT ecosystem, not complicate it. Favor open architectures that integrate smoothly with core systems like Active Directory, cloud platforms,
and identity management tools. Avoid vendor lock-in. Solutions should work with both existing and new deployments. Look for an open API framework that enables custom integrations with third-party tools, giving your team the flexibility to tailor the system to your needs.
Rather than a one-size-fits-all model, the right vendor should help you design a solution that fits your operational needs today and can scale as those needs evolve
Security is non-negotiable. Your vendor should support end-to-end encryption and secure data transfer protocols to safeguard sensitive information. Compliance with global standards and regional laws such as GDPR, NIS2, ISO 27001, CCPA/ CPRA, and the EU AI Act is essential. Expect granular user controls—role-based permissions and multi-factor authentication—and comprehensive audit trails to ensure accountability. Vendors should demonstrate cybersecurity maturity through SOC 2 Type II audits and certifications under ISO/IEC 27017 and ISO/IEC 27001. Look for transparency in their security posture and vulnerability management practices.
Your physical security systems must be reliable around the clock. Insist on solutions with high-availability configurations and clearly defined service level agreements (SLAs). Automated failover and disaster recovery capabilities should be built in. Scalability matters, too. The system should handle growing data volumes and the deployment of new systems and facilities without sacrificing performance.
Understanding the total cost of ownership (TCO) is essential for long-term planning. Transparent pricing structures should en-
compass licensing, implementation, and maintenance costs, avoiding hidden fees. Look for solutions that deliver measurable ROI, whether through operational efficiencies, intelligent analytics, or risk mitigation. A flexible, choice-driven approach can offer significant advantages by giving organizations the flexibility to adopt cloud services at their own pace while continuing to use existing on-prem infrastructure. This model provides both technical and financial flexibility, enabling tailored deployments that align with your specific environment and budget. Rather than a one-sizefits-all model, the right vendor should help you design a solution that fits your operational needs today and can scale as those needs evolve. Flexible licensing models (subscription or perpetual) can help align expenditures with financial planning.
Vendor stability and reputation matter. Choose a partner with a proven track record and a strong presence in the global physical security market. Examine case studies across various industries to gauge the vendor’s ability to meet diverse security requirements. Comprehensive support and maintenance offerings are equally important. Look for 24/7 technical assistance, dedicated customer portals, technology partnerships, vendor cybersecurity track record, and a demonstrated commitment to continuous improvement through regular software updates.
Deployment should be collaborative and minimally disruptive. The best vendors will work with you to develop a detailed implementation plan and timeline. Prioritize vendors that offer structured change management support, such as phased deployments, hands-on training, stakeholder engagement, and user feedback loops. Empower your teams with robust documentation and training resources to drive adoption and longterm success.
A proactive approach to risk is essential. Your vendor should provide clear vulnerability management and incident response protocols. Pilot programs are invaluable. Insist on the ability to test the solution in your environment before a full deployment. This allows you to validate performance, compatibility, and usability under real-world conditions.
Selecting a physical security technology vendor is a strategic decision with longterm impact. For IT leaders, the goal is to choose a partner whose solutions integrate seamlessly with your ecosystem, support regulatory compliance, and scale with your organization’s evolving needs. n
In an increasingly interconnected and high-risk world, protecting critical infrastructure is no longer a matter of physical barriers alone. From energy and utilities to government buildings and transportation hubs, the demand for intelligent, integrated, and resilient access control systems is driving a new wave of innovation across the security industry. At the forefront of this transformation is IDtech, a European access control specialist with a growing international footprint and a strong reputation for protecting high-stakes environments
n By: Thomas Deville tdeville@idtech.eu
In this article, we will explore three key dimensions of today’s advanced access control solutions: the latest innovations in securing critical infrastructure, IDtech’s integration with best-in-class video and AI technologies, and major reference projects that demonstrate how these systems are being deployed in realworld scenarios in the Middle East.
Innovations in access control for critical infrastructure
The security landscape for critical infra structure has become significantly more complex over the past decade. Beyond guarding entry points, today’s access control systems must offer multilayered protection, situational awareness, and adaptive threat response, all while complying with stringent data protection and operational standards. Some of the most important innova tions now reshaping this field include:
- AI-powered credential verification: facial recognition, behavioral biometrics, and multi-factor authentication systems improve both security and user convenience.
- Cloud-enabled platforms: secure cloudhosted access control allows central management of multiple remote sites, with rapid scalability and secure data storage.
- Integration with Video Analytics: combining access logs with live video verification allows operators to detect anomalies instantly and respond to threats proactively.
- Cyber-resilient architecture: as physical security systems become part of broader IT ecosystems, protecting them from cyber threats is now a top priority.
IDtech’s Integrated Solutions: From onpremises security to AI-driven intelligence
IDtech has long been known for its robust, enterprise-grade physical access control systems (PACS), widely deployed across Europe’s most sensitive facilities. But its latest offerings go far beyond traditional door control.
Access Control + Video: a seamless integration with Milestone XProtect®: one of IDtech’s standout developments is its tight integration with Milestone XProtect®, a leading video management system. This integration empowers users with a unified interface where video feeds are automatically linked with access events, enabling:
- Real-time verification: operators can instantly see who accessed a door and whether their credentials matched their identity on
- Alarm synchronization: suspicious access attempts trigger video bookmarks and alerts across systems, enabling faster
- Streamlined forensics: in case of security incidents, correlated data simplifies review and reporting.
By bridging physical access and surveillance into a single ecosystem, IDtech ensures that security teams are not just watching, but understanding and responding in real time.
AI-powered PACS: advanced Video Analytics with Aicuda: in partnership with Aicuda, a specialist in intelligent video analytics, IDtech is taking access control even further. Their joint solutions add a layer of AI-based interpretation to the system, unlocking capabilities such as:
- Facial recognition: seamless identification of personnel, even in low-light or masked conditions.
- License Plate Recognition (LPR): automated vehicle access tied to driver credentials and site-specific permissions.
- Object and behavior detection: identification of unusual objects or behavior patterns near secure zones.
- PPE detection: ensuring workers entering hazardous areas are wearing mandatory protective equipment—enhancing not just security, but occupational safety compliance.
These tools not only boost security effectiveness but also support operational oversight and regulatory compliance, es-
pecially in sectors like energy, manufacturing, and transport.
With growing geopolitical and infrastructure investment across the Middle East, IDtech has delivered several high-profile projects in the region, tailored to local needs such as data sovereignty, cybersecurity regulations, and environmental resilience.
Cloud-based access control system hosted on Oracle Cloud Infrastructure: in one major deployment for a UAE-based critical infrastructure, IDtech implemented a fully cloud-hosted access control and alarm management solution on Oracle Cloud Infrastructure (OCI). This project stands out for its:
- Data sovereignty compliance: all data is hosted within the country’s borders, in full compliance with national regulations.
- Cybersecurity hardening: the system includes advanced encryption and continuous vulnerability monitoring.
- Integration with Avigilon Unity: IDtech PACS is seamlessly integrated with Avigilon’s VMS, providing real-time visual verification and advanced video analytics.
- Scalable multi-site management: a single cloud dashboard controls access across three critical sites, with granular access policies and audit trails.
This project reflects a broader shift toward secure cloud adoption in critical infrastructure, balancing flexibility with stringent local compliance.
Securing an Adnoc Gas site with explosion-proof surveillance and AI: another notable deployment involves securing the entrance of an Adnoc Gas facility, where safety and surveillance requirements are exceptionally high due to the nature of operations
Here, IDtech integrated its access control system with explosion-proof Axis cameras to monitor entry zones exposed to hazardous materials and Aicuda analytics performing:
- Facial recognition for employee and visitor validation
- License plate recognition for automated gate control
- Object detection to flag abandoned items or unauthorized materials such as telephones
- PPE detection to ensure all staff entering the site meet safety standards
This project illustrates how access control and AI-driven video analytics can serve dual purposes: securing sites and enforcing safety compliance, a growing priority in industrial and energy environments.
As critical infrastructure becomes a focal point for both physical and cyber threats, the integration of intelligent, adaptable access control systems is no longer optional — it is essential. IDtech’s approach combines proven reliability, cutting-edge integration, and deep domain expertise, particularly in high-risk and complianceintensive sectors.
Whether deploying cloud-based solutions with strict data governance, or fusing AI analytics with traditional access control, IDtech is helping organizations take the next step toward proactive, intelligent security. n
In the fast-growing economies of the Middle East, businesses face mounting pressure to keep operations safe, efficient, and resilient—whether in retail, logistics, or critical infrastructure. Security teams are no longer just guarding doors; they are expected to deliver clear answers fast, prevent incidents proactively, and keep operations flowing smoothly, day and night
n By: Orhan Hadžagić orhan.hadzagic@asmideast.com
For many, traditional CCTV systems can’t keep up. Poor image quality, blind spots, and hours wasted searching through footage all cost money, time, and peace of mind.
TRASSIR, a global developer of intelligent video surveillance and analytics solutions, addresses these challenges with its new 5MP camera series — designed specifically to help businesses see more, react faster, and stay ahead of risks in the Middle East’s demanding environments.
Clearer footage, quicker response
Imagine a retail chain in Riyadh facing daily challenges with shrinkage and false alarms. Security teams often struggle to verify incidents due to grainy night-time footage or limited coverage. The new 5MP TREND v7 series solves this with crystal-clear imaging, upgraded IR illumination for reliable night vision, and dis-
The real power lies in the built-in video analytics: line crossing detection, people counting, area control, and vehicle tracking, tools that help teams spot suspicious behavior automatically, receive instant alerts, and cut investigation time from hours to minutes
For TRASSIR, this launch is about more than cameras — it’s about helping businesses across the Middle East build smarter, scalable security infrastructure that adapts to real-world challenges
creet audio recording for complete situational awareness.
But the real power lies in the built-in video analytics: line crossing detection, people counting, area control, and vehicle tracking — tools that help teams spot suspi-
cious behavior automatically, receive instant alerts, and cut investigation time from hours to minutes.
Fully integrated into TRASSIR’s advanced VMS ecosystem, these cameras are easy to deploy at scale, helping businesses re-
duce total cost of ownership while expanding coverage wh ere it matters most.
Outside of retail, logistics and transport hubs across the region face another challenge: how to maintain clear, actionable footage around the clock. Traditional infrared cameras capture black-and-white video at night, but important details—like the color of a vehicle or a person’s clothing — can be lost.
The new 5MP PRO Dual Light v3 series solves this with smart dual illumination. By switching seamlessly between invisible IR for discreet monitoring and powerful LED white light for full-color imaging, businesses get vivid, high-quality footage even in total darkness. This means faster incident resolution, better evidence, and no need for costly external lighting.
For TRASSIR, this launch is about more than cameras — it’s about helping businesses across the Middle East build smarter, scalable security infrastructure that adapts to real-world challenges.
Backed by a 5-year warranty and fully supported within the TRASSIR ecosystem, the TREND v7 and PRO Dual Light v3 series offer the clarity, control, and actionable insights that modern security teams need to protect assets, people, and reputations.
In an age where every detail counts, TRASSIR makes sure you don’t miss a moment — so you can act with confidence when it matters most.
From Türkiye to Kuwait, Saudi Arabia, and the UAE, TRASSIR solutions have already powered high-impact projects across retail, transportation, industrial, and government sectors — proving our commitment to security excellence across the region.
Ready to upgrade your security strategy?
Visit trassir.com to learn how TRASSIR can help future-proof your operations. n
XPR unveils Xsecure® Encryption Technology with robust AES encryption and proprietary credential architecture; Xsecure® delivers unmatched protection against cloning and data breaches in access control systems; Seamlessly integrated into XPR devices, it sets a new benchmark for security through encrypted credentials and mutual authentication
n By: Orhan Hadžagić orhan.hadzagic@asmideast.com
XPR Group, a trusted name in access control for nearly 40 years, is proud to introduce Xsecure®, our encryption and credential system developed to provide access control environments with next-level protection. Designed in-house by XPR, Xsecure® provides a robust alternative to traditional Card Serial Number (CSN) identification. It uses encrypted credentials and secure data management to safeguard systems against contemporary security threats
“With Xsecure®, we provide integrators and end users with a solution that is secure by design. It is built on strong encryption, mutual authentication and exclusive access to sensitive key sets.” says Nicolas von Oberndorff, Product Director at XPR Group.
When the reader detects a card (1), it assembles the card access key (unique for each card) (2), reads the card content (3), decrypts the card content (4), extracts the ID (5), and sends it to the controller (6)
Xsecure® is an advanced encryption and credential system developed by XPR to improve the security of the access control beyond traditional CSN-based identi-
fication. Rather than using unprotected card serial numbers, Xsecure® allows systems to identify users via encrypted data stored on MIFARE DESFire cards. It uses the card’s native AES encryption in combination with XPR’s proprietary key
diversification algorithm, data encryption layers, and validity checks. This architecture ensures that sensitive information is protected from the point of issuance to the moment of access.
One of the central features of Xsecure® is its resistance to cloning. All encryption keys and processes are securely stored within the reader and cannot be accessed by third parties, including system integrators and software platforms. This isolation prevents external duplication and protects credentials against theft or manipulation.
Xsecure® has been implemented in the latest XPR readers, including the Xpro and Xsmart ranges. It is fully compat-
Xsecure® has been implemented in the latest XPR readers, including the Xpro and Xsmart ranges. It is fully compatible with standard access control protocols including OSDP, RS-485, and Wiegand
ible with standard access control protocols including OSDP, RS-485, and Wiegand.
The Xpro and Xsmart readers support both card and mobile credentials, and ensures that communication between the reader and controller is end-toend encrypted, with authentication at every step.
With the launch of Xsecure®, XPR is setting a new standard in secure identification, providing an architecture that is invisible to attackers yet highly effective where it matters most. n
To find out more, visit: www.xpr-readers.com/security/xsecure
Ensuring security upgrades are successful requires close collaboration between physical security, cybersecurity and/or IT security departments
n By: Sam Cherif, Senior Director, Regional Business Head, MEA editorial@asmideast.com
In the Gulf region, national digital strategies, mega-projects, and critical infrastructure programs are transforming the security landscape. Today’s access control systems are multi-taskers, going beyond just protecting against unauthorized entry to now integrating with other mission-critical organizational areas including human resources (HR), facilities, information technology (IT), and building management systems like heating, ventilation and air-conditioning (HVAC) and environmental services. This shift is reshaping various operational frameworks, including procurement and decision-making processes around upgrades, while also eliminating the siloes between physical access control and cybersecurity.
According to HID’s 2024 State of Access Control Report, installers, integrators, consultants, and vendors who deal directly with the end user increasingly
must balance multiple demands and influences from several departments when upgrading systems. And while final authority is still most likely to rest with C-Suite executives such as the chief information security officer (CISO), chief information officer (CIO), and chief technology officer (CTO), or even the physical security department, many other departments exert some degree of influence in the decision-making process. These most often include the sustainability department (38%), facilities (31%), procurement (28%) and IT (21%).
The annual State of Access Control report surveyed organizations worldwide representing industry verticals including manufacturing and industrial (16%); professional services (10%); government/public sector (10%); software, technology and communications (8%); healthcare (6%); retail (5%); and banking (5%).
One of the key indicators of what lies ahead for those tasked with security system decisions is the age of the systems currently in use. The majority of organizations surveyed said they are working with access control technology that is no more than six years old. Older, potentially more vulnerable legacy systems account for a much smaller proportion of the market (19%), though this may be an underestimate as more than 15% of respondents were unsure of their system’s age.
Additionally:
• 42% reported their organization’s access control was under three years old.
• 14% said their access control system was over six years old.
• 54% planned to upgrade access control system software.
• 53% planned to upgrade readers and credentials.
• 50% intend to upgrade controllers. Importantly, the survey found that ensuring those upgrades – or any changes to security systems – are successful requires close collaboration between physical security, cybersecurity and/
Installers, integrators, consultants, and vendors who deal directly with the end user increasingly must balance multiple demands and influences from several departments when upgrading systems
or IT security departments. Nearly half (48%) of all respondents stated that the IT department is “fully consulted” when it comes to upgrading physical access control systems, despite its overall influence being less than that of other departments. These dynamics reflect regional priorities, with initiatives like Saudi Vision 2030 and the UAE’s digital transformation agenda positioning secure, scalable access control as a cornerstone of smart infrastructure.
Additionally, when identifying which departments have authority or influence in upgrade decisions, more than 70% of respondents pointed to the physical security department while just 53% indicated it was the IT department. Behind IT were facilities (50%), information security (35%), procurement (27%) and C-Suite (24%). Fifty-eight percent indicated that they work with the IT department to establish best security practices, while 55% said they collaborate with IT when looking for new technologies.
The report’s findings are indicative of the growing movement by organizations across industries to merge physical and cybersecurity operations – a shift that began when physical security systems transitioned from analogue, closed circuit, siloed systems to IP-based networks and IP endpoints.
In the Middle East, this is particularly relevant for sectors like energy, aviation, and government, where IP-connected security systems must meet increasingly stringent risk and compliance requirements. Unifying these operations also helps mitigate the growing threats that come with interconnected devices, many of which are now directly attached to an organization’s IT network. The sensitive data required to safely control access must move through multiple components, including credentials, readers, controllers, servers, software clients
and more. Without proper protection, this data is highly vulnerable to attacks and data breaches that come with realworld consequences. Not only did the average data breach cost $4.45 million in 2023 (a 15% increase since 2020), but a compromised access control system also allows nefarious actors to access restricted areas, disable alarms, alter permissions and steal proprietary information. This type of risk is especially acute in the Gulf, where national infrastructure and high-value facilities are common targets of sophisticated cyber-physical threats.
Further, when physical and cybersecurity function independently, blind spots emerge. This lack of visibility complicates efforts to identify and address security gaps, compromising the confidentiality, integrity and availability of access data. Gartner predicts that by 2025, 41% of enterprises plan to converge parts of cyber and physical security - a 10% increase over 2020. In a region focused on proactive risk management, this convergence is not just a recommendation; it’s quickly becoming standard practice.
Today’s access control systems do more than protect against intruders; they also play an integral role in protecting against bad actors who set their sights on an organization’s data. To secure both people and digital assets, organizations must evaluate not just the integrity of individual security components, but how data flows between them and where weak points may exist In the Middle East, where digital transformation is a top national priority, organizations that bring together security, IT, facilities, and sustainability teams are best positioned to protect what matters most. By eliminating silos and fostering collaboration, they can fully secure the sensitive personnel and facility data needed to support smarter, more resilient operations. n
The data-handling bottleneck in any video surveillance system is the human brain –people are brilliant at cognitive tasks that require experience and intuition, but poor at processing large amounts of data
n By: Mirza Bahić mirza.bahic@asmideast.com
So, while your control room operators may be irreplaceable when it comes to reviewing and assessing footage, making snap decisions, and managing responses, even the most experienced personnel can become tired, lose attention, or be distracted.
Even assuming they are well-trained, highly motivated, and at the start of their shifts, they will still only be able to handle so much visual data at any one moment. And with that human limitation comes potential risk.
The data burden is also growing, as it has become ever more practical to extend video coverage to ensure complete domain awareness, target cameras entrances and other vulnerable and sensitive areas, and to store footage more affordably. Cameras have improved in their ability to see further and across wider areas in higher definition, regardless of lighting conditions and environmental challenges. There are also many more of them, particularly on large sites, around perimeters, and in organizations with multiple sites. Additionally, a common justification for video system investments and upgrades is that they enable organisations to offset upfront equipment and installation expen-
ses by reducing costs through the redeployment of officers.
However, when security headcounts decline, it further increases the burden on operators.
Without support, control room teams can be overwhelmed in a range of situations, such as a rapid succession of events, simultaneous events, surges in activity, or a major incident. Risk doesn’t wait in line until security and safety teams are ready to deal with it.
The problem is that these are precisely the moments when real-time video surveillance should deliver its ultimate benefit and ensure golden opportunities aren’t missed by preventing situations from escalating, deterring criminal activity, or effi-
ciently supporting security teams to target incidents that have already occurred with a rapid and appropriate response.
So among leading manufacturers, there is a continual focus on developing solutions that are easier to work with and that help operators to cope with high-stress incidents without being overwhelmed. This focus is one of the drivers behind the current rapid evolution of AI video analytics solutions.
We are seeing many new AI video technologies designed to help surveillance teams do more with less, be more accurate, tireless, and consistent, and focus on what they do best: informed decision-making and responding to alerts.
For example, one of the most recent and
important innovations is A-Cut, introduced by Korean video surveillance leader IDIS.
A-Cut is designed to overcome the challenge of locating crucial scenes, featuring objects or people of interest, among vast amounts of video footage. It automatically extracts the best representative image of any target object or person, crops the image, and presents it in a way that makes it easy for operators to find. By simply clicking on the cropped image, the operator is automatically taken to the precise moment in the recorded video stream when the object last appears. With this user-friendly capability, A-Cut provides operators with immediate access to key events, significantly accelerating incident verification. Each cropped image is indexed as a searchable visual moment, allowing for rapid identification of persons or objects of interest across video footage, tracking of movements, and the quick formation of an accurate picture of a sequence of events.
The cropped images become even more powerful search tools when combined with IDIS AI Search functions powered by IDIS’s highly accurate deep learning engine.
Every cropped image is classified objects into three categories: people, faces, and vehicles.
To make tracking even easier, A-Cut combined with AI Search also identifies object attributes and allows filtered searches –for example, searching for people by age and gender, by clothing colour, or whether they have accessories such as glasses, hats, masks, or bags; or searching for vehicles by colour or type.
The aim is to support security operators in responding more quickly to potential threats, allowing intervention at an earlier
stage, says Dr. Seong-Jin Yun, Head of R&D Center Advance Technology Division and SVP, IDIS.
“A-Cut technology will prove invaluable in a wide range of monitoring applications,” Dr. Seong-Jin Yun says. “Whether you’re safeguarding public spaces, overseeing retail operations, or managing security at sensitive facilities, A-Cut delivers unmatched speed, clarity, and control—helping your team retain comprehensive situational awareness and respond quickly and appropriately to a security threat or safety incident.” n
In an AI-driven world, fake faces, voices, and identities are no longer science fiction. Deepfakes have already caused real damage, helping criminals steal identities, hijack accounts, and commit financial fraud. These hyper-realistic forgeries are now being tested against physical security systems. Why is this so dangerous? Because biometric systems—especially facial recognition—are now widely used to control access to offices, data centers, and critical infrastructure. If a deepfake can trick these systems, attackers could walk through the front door undetected
n By: Orhan Hadžagić orhan.hadzagic@asmideast.com
Suprema is taking this challenge head-on. With industry-leading AI biometric technology and proven antispoofing capabilities, Suprema is setting a new standard for how security systems defend against deepfakes.
Suprema’s AI-Powered Authentication Proven in Real-World
Suprema has over 25 years of real-world access authentication experience, enabling unmatched accuracy and resilience. Building on this foundation, Suprema has spent years developing its own deep learning algorithms specifically for facial authentication and fingerprint recognition. These AI algorithms are trained with massive datasets including real images, spoofed faces, and video captures, enabling them to accurately distinguish between a real person and a fake one.
Suprema’s facial authentication devices use dual RGB and infrared camera. Com-
bined with this real-time liveness detection camera and advanced AI algorithms, they offer strong resistance to deepfakes. It has also passed the ISO/IEC 301073 anti-spoofing test conducted by iBeta, one of the world’s most trusted biometric testing labs. This technology works in any condition, for anyone. Suprema delivers exceptional
accuracy across all ethnicities and facial variations, even when users are wearing glasses, hats, beards, niqabs, face masks, or have diverse hairstyles. The system also performs reliably in difficult lighting conditions, from low light and glare to extreme backlighting.
Suprema’s fingerprint recognition technology also incorporates deep learning
and advanced anti-spoofing capabilities to detect fake fingerprints. Deep learning enables accurate template extraction even from low-quality, noisy, or distorted fingerprints. Additionally, the Live Finger Detection (LFD) technology effectively identifies fake fingerprints made from materials like rubber, paper, film, clay, and silicone by analyzing unnatural features and inconsistencies.
Suprema’s fingerprint recognition technology has received Grade 1 certification in the ‘Finger-print Recognition Performance Test’ conducted by the Korea National Biometric Test Center (K-NBTC) which operates under the Korea Internet & Security Agency (KISA), a government organization designated based on stringent ISO/IEC performance standards.
Strong security doesn’t stop at one layer. Suprema offers the industry’s most complete set of credentials—face, fingerprint, mobile access, QR code, barcode, PIN, RFID—so organizations can implement Multi-Factor Authentication (MFA) based on their needs.
A popular and highly secure setup combines facial recognition with a mobile credential. Users authenticate by scanning their face and verifying it through a se-
Suprema’s facial authentication devices passed the ISO/IEC 30107-3 anti-spoofing test conducted by iBeta, one of the world’s most trusted biometric testing labs
cure app on their smartphone. It’s fast, simple, and much harder to spoof.
Suprema’s AI-powered biometric solutions, combined with robust multi-factor authentication, are trusted across sectors where security is non-negotiable— government, defense, healthcare, fi-
nance, data centers, and critical infrastructure. In these critical industries, preventing unauthorized access is not optional—it’s essential. Suprema ensures that only verified, authorized individuals gain entry.
The threat from deepfakes is growing, and many in the industry are only beginning to take notice. But Suprema has been preparing for this moment for years. “Suprema is already ahead of the curve with mature, tested, AI-powered technologies in the field today.” said Hanchul Kim, CEO of Suprema Inc.
Rather than reacting to threats after they happen, Suprema builds future-proof protection into every product. Its solutions are designed to evolve as attacks evolve because that’s what true security requires. n
A greater focus on health, sustainability, and productivity, means that the need for optimal indoor environments in commercial spaces has never been more critical. Indoor air quality (IAQ) plays a major role in the well-being of employees and visitors, impacting everything from health to performance. Indoor air quality sensors are becoming an essential part of solutions to monitor and improve air quality in “smart” commercial buildings AXIS COMMUNICATIONS
n By: Sienna Cacan sienna.cacan@axis.com
As highlighted by independent industry analysts such as Memoori, connected devices and sensors in commercial buildings – together part of the Internet of Things (IoT) – is a significant area of growth. Foundational to the vision of “smart” commercial buildings are a new generation of connected sensors, providing insight and data on every aspect of a building’s operations, from lighting to security, from heating to occupancy. Alongside other connected technologies, including video surveillance cameras, audio, and access control solutions, these support enhanced building security, safety for occupants, and improved operational efficiency. One emerging area of focus are environmental sensors, including those measuring air quality.
Why indoor air quality matters in commercial real estate
The quality of the air we breathe significantly impacts our health, productivity, and overall well-being. In commercial real estate, where employees often spend many of their waking hours, poor air qual-
ity – often also referred to as Indoor Air Pollution (IAP) - can lead to a range of issues. These include: Health issues: Research has shown that exposure to pollutants like volatile organic compounds (VOCs), allergens, or elevated carbon dioxide (CO2) levels can trigger respiratory issues, fatigue, headaches, and more severe long-term health conditions.
Reduced productivity: A study by Harvard University found that employees in poorly ventilated environments with high levels
of CO2 may experience decreased cognitive function, concentration, and energy. Compliance with regulations: As environmental standards become more stringent, especially with a focus on sustainability and employee well-being, commercial buildings are increasingly required to meet specific air quality standards. Tenant turnover: Whether it’s an office, retail space, or multi-tenant building, IAQ plays a significant role in tenant retention. Building owners and operators who prioritize air quality are seen as more re-
sponsible and tenant-friendly, potentially leading to higher occupancy rates and lease renewals.
The increasingly critical importance of the issue has led to the use of connected technologies to help measure and monitor IAQ. Central to these solutions are IAQ sensors.
IAQ sensors are devices designed to measure various air pollutants and environmental parameters in a building. These sensors can detect levels of particulate matter (PM2.5 and PM10), carbon dioxide (CO2), volatile organic compounds (VOCs), temperature, humidity, and even levels of carbon monoxide (CO). By continuously monitoring these parameters, IAQ sensors provide real-time data to building managers, helping them make informed decisions about ventilation, filtration, and other methods of improving air quality.
IAQ sensors provide commercial real estate professionals with the information and data they need to actively monitor and improve air quality. Through continuous, real-time monitoring of air quality levels, should any pollutant reach an unsafe threshold, building management can receive instant alerts. This allows for immediate action to prevent health risks or discomfort for occupants. The information provided by IAQ sensors allows property managers and building owners to make data-driven decisions about how to optimize air quality. For example, sensors can identify specific areas that require better heating, ventila-
In commercial real estate, where employees often spend many of their waking hours, poor air quality – often also referred to as Indoor Air Pollution (IAP) - can lead to a range of issues
tion, and air conditioning (HVAC) system adjustments.
Making system adjustments in specific areas without needing to operate at full capacity throughout the entire building can help optimize HVAC system energy usage, while also potentially extending the life of equipment.
As a result, IAQ sensors contribute to a building’s overall sustainability goals by improving energy efficiency, reducing unnecessary waste, and positively impacting employee well-being.
In addition, many commercial real estate owners seek green building certifications like LEED (Leadership in Energy and Environmental Design). IAQ sensors can play a crucial role in meeting the indoor environmental quality requirements for these certifications, showcasing the building owner’s commitment to sustainability. Finally, as businesses increasingly adopt wellness-focused strategies, air quality becomes an essential part of ensuring a healthy indoor environment. IAQ sensors provide a measurable way to guarantee that air quality standards are met, directly benefiting tenant satisfaction and employee well-being.
The role of IAQ sensors in commercial real estate will continue to evolve as technology advances. Sensors will become more integrated with other “smart
building” systems, including automated lighting, heating, and cooling. This integration will enable buildings to automatically adjust to optimize air quality, energy efficiency, and occupant comfort.
With the help of AI and machine learning, such sensors could predict potential air quality issues before they occur, helping building managers perform proactive maintenance on HVAC systems. Building owners may also leverage sensor data to engage tenants and employees by providing real-time information on air quality conditions. Some may even integrate IAQ monitoring into tenant-facing apps, empowering people to monitor and improve their own work environments.
Indoor air quality is no longer just a “niceto-have” factor in commercial real estate; it is a key element that affects tenant health, productivity, energy efficiency, and sustainability.
By incorporating IAQ sensors into commercial buildings, owners and managers can ensure that their spaces are healthy, comfortable, and in compliance with evolving regulations.
As technology continues to advance, IAQ sensors will play an even more vital role in shaping the future of the commercial real estate industry, creating environments that prioritize both the health and wellbeing of all who occupy them. n
SCREENCHECK
Smart cities are built on secure access, trusted identities, and resilient infrastructure — and that is exactly where ScreenCheck makes a difference. With over two decades of experience in the region, ScreenCheck has developed a deep understanding of the diverse and evolving security needs across sectors, from government and healthcare to education and critical infrastructure
n By: Orhan Hadžagić orhan.hadzagic@asmideast.com
As cities across the Middle East continue to reimagine urban living through large-scale digital transformation, one foundational element is emerging as a quiet but critical enabler: secure identity infrastructure. From mobile citizen services to autonomous transport hubs, the systems that verify who we are — and control where and when we move — are becoming as vital as the networks that connect us. This shift is happening in parallel with a surge in investments across AI, IoT, and cloud ecosystems. In the Gulf Cooperation Council (GCC), digital identity and access management (IAM) is now seen not just as a security layer, but as a strategic enabler of national visions — from UAE Vi-
sion 2031 to Saudi Arabia’s Vision 2030 and Qatar National Vision 2030
At the intersection of infrastructure, identity, and innovation, a new class of intelligent IAM systems is taking shape — biometric-enabled, mobile-first, AI-enhanced, and cloud-native. These systems don’t just lock doors; they shape the experience of movement, access, and security across cityscapes.
One company at the forefront of this evolution is ScreenCheck, a regional player with over two decades of experience in security technologies. While the company has long supported the public and private sectors with access control systems, its
The initiative aimed to eliminate traditional plastic cards in favour of secure mobile credentials, enhancing convenience while also supporting sustainability goals
recent focus on AI-driven identity solutions reflects a broader industry pivot — from transactional access to intelligent, integrated ecosystems.
“As cities become smarter, access must become more predictive, seamless, and adaptive. AI is playing a key role in that transition — helping us not only recognize identities but anticipate behaviors, detect anomalies, and ensure security at scale,” says a senior consultant close to the sector.
The smart city vision in the GCC is deeply tied to automation, sustainability, and citizen-centric design. But as governments and developers move from legacy infrastructure to hyperconnected environments, the security architecture must evolve in tandem.
ScreenCheck’s approach illustrates this shift. The company now deploys platforms that unify access control, identity authentication, RFID tracking, AI-based surveillance, and cloud management — all into single, scalable systems. These solutions
The role of identity management is changing — from static authentication to dynamic enablement. Smart cities are no longer just about connecting infrastructure, but about orchestrating trusted interactions between people, devices, and systems.
span government offices, transport terminals, healthcare networks, education campuses, Entertainment facilities, Residential projects, Retail centres, corporate environments, and high-security industrial zones, tailored to each sector’s compliance and operational needs.
Several notable implementations across the region demonstrate how access control is being redefined:
1. Mobile-First Access for Smart Islands
In a large-scale smart infrastructure project in Qatar, a fully digital access system was rolled out across a residential and commercial island development. The initiative aimed to eliminate traditional plastic cards in favour of secure mobile credentials, enhancing convenience while also supporting sustainability goals. ScreenCheck, in partnership with the leading system integrator, deployed over 850 mobileenabled Suprema readers, integrated with visitor management, ANPR, and biometric time and attendance systems
More than two years into its operation, the mobile-first model has proven reliable, scalable, and environmentally conscious.
2. Securing the Entertainment Infrastructures
At one of the world’s largest upcoming amusement parks in Saudi Arabia, smart
security is emerging as a foundational pillar, extending well beyond traditional access points. As the Kingdom accelerates investment in large-scale entertainment and leisure projects in line with Saudi Vision 2030, the protection of critical IT infrastructure has become a strategic priority. In this high-profile development, ScreenCheck is playing a key role in securing the core digital infrastructure that supports park operations. In an environment powered by data, automation, and immersive technologies, robust and integrated security systems are essential to ensuring seamless connectivity, visitor safety, and long-term operational resilience.
3. BYOD-Based Attendance Management for Distributed Workforce
For one of the largest facility management systems in the UAE, ScreenCheck implemented a BYOD (Bring Your Own Device) based attendance management solution. With employees deployed across multiple locations, traditional systems proved ineffective. The solution leveraged employees’ smartphones for clocking in and out, with integrated GPS tracking to log attendance based on the actual location of the facility. This approach delivered greater flexibility, accuracy, and transparency while ensuring alignment with HR and compliance protocols.
In a deployment at one of the largest data centers in the Middle East, a Real-Time Location System (RTLS) was implement-
ed to track personnel movement in sensitive zones, enabling faster emergency response, enhanced audit trails, and improved occupancy analytics.
As smart cities generate exponential volumes of data, data centers have become their digital backbone, and their physical security is now as critical as cyber defense. A recent Research and Markets report projects the Middle East data center market will grow to nearly USD 7.94 billion by 2028, with rising emphasis on physical access, environmental monitoring, and uptime assurance.
ScreenCheck, together with integrators, is building layered security architectures that protect data flow from the edge to the core
The role of identity management is changing — from static authentication to dynamic enablement. Smart cities are no longer just about connecting infrastructure, but about orchestrating trusted interactions between people, devices, and systems. AI is now central to this transformation. From predictive threat detection to automated compliance monitoring, identity platforms are becoming intelligent agents — not just guards, but guides — within the urban experience.
And as governments in the region push forward with bold smart city ambitions, companies like ScreenCheck are helping turn vision into reality — securing not just doors and networks, but the very foundations of tomorrow’s digital cities. n
Oman’s Bidbid Tunnel, a critical infrastructure project along the Bidbid-Sur road, has been equipped with a sophisticated Axis AX fire safety system from Advanced
n By: Alex Robertson editorial@asmideast.com
This installation, overseen by Middle East Wealth’s LLC, ensures the safety of motorists and tunnel operators by integrating cutting-edge fire detection and suppression mechanisms tailored to the tunnel’s unique environmental challenges. The Bidbid Tunnel is a remarkable feat of engineering, carved through two mountains and designed to accommodate heavy traffic while maintaining stringent safety standards.
Due to the tunnel’s exposure to fluctuating humidity levels, a hybrid fire detection system was required, partly addressable and partly non-addressable, with IP67-rated components ensuring resilience against moisture. The installation also covers service buildings and control rooms that monitor tunnel operations, including jet fans, which detect smoke and adjust airflow direction to optimise smoke extraction. A key feature of the fire safety installation is the water deluge system, which inte-
A key feature of the fire safety installation is the water deluge system, which integrates jet fans, designed using genuine aircraft jet technology, with sprinklers to manage fire hazards effectively
grates jet fans, designed using genuine aircraft jet technology, with sprinklers to manage fire hazards effectively. The
sprinklers work to suppress flames and reduce smoke production, while the jet fans play a crucial role in directing and
Advanced’s Axis AX system was selected for its networking capabilities and large-scale adaptability, making it the ideal choice for this governmental project
extracting smoke from the tunnels. Given the close proximity of tunnel entrances, the system has been meticulously designed to prevent smoke from being pushed into adjacent tunnels, ensuring clear evacuation routes and optimal visibility for emergency responders.
Advanced’s Axis AX system was selected for its networking capabilities and largescale adaptability, making it the ideal choice for this governmental project. The installation includes three Axis AX panels and 25 heavily programmed stainlesssteel PENN (Peripheral Expansion Network Node) integration boxes to meet the complex needs of this unique application.
Sanjay Sebastian, Project Manager at Middle East Wealth, commented: “The
Bidbid Tunnel project required a fire safety solution that could withstand extreme conditions while offering seamless integration with tunnel management systems. Advanced’s Axis AX system provided the reliability and flexibility needed to meet these demands, ensuring comprehensive protection for motorists and infrastructure alike.”
Mark Taylor, Senior Technical Support Engineer at Advanced, added: “This installation showcases the power of Axis AX in managing large-scale, high-risk environments. The combination of linear heat detection, jet fan integration, and the water deluge system ensures that fire hazards are swiftly detected and mitigated, reinforcing the tunnel’s safety infrastructure.”
Raj Narayanan, General Manager at Middle East Wealth’s LLC, added: This project is one and only public road tunnel project in Oman with such a complexity, the main control room which is located nearby the longest tunnel (KM33) which takes over the control of both tunnels, KM33 as well as KM24 which is around 9 kilometres away from the main control room. And during the testing and demonstration of the system, the overall signalling which took place nearly within 3 seconds. Since the overall operation of the tunnel such as jet fan operations, CCTV system, Traffic signage etc will be taken over by fire alarm system, Advanced most powerful network communication and fastest signal exchange helped to achieve in complete integrated and synchronised way. With its intelligent fire detection, suppression, and management capabilities, the Bidbid Tunnel is now equipped to handle emergency scenarios with precision and efficiency. This installation underscores Advanced’s commitment to delivering robust and scalable fire protection solutions for critical infrastructure projects worldwide. n
TABBARA ELECTRONICS
Trusted by mission-critical sectors across the Gulf and MENA region, Tabbara Electronics is redefining secure communications and surveillance through smart integration, regional expertise, and long-term partnership
n By: Mirza Bahić editorial@asmideast.com
In an era defined by rapid digital transformation and rising security demands, the Middle East is accelerating its investment in technologies that connect, protect, and empower. From government agencies and defense forces to transportation, energy, and critical infrastructure operators, organizations are turning to partners that not only understand global innovation but also the operational realities of the region.
Tabbara Electronics has established itself at the forefront of this evolution. With decades of expertise in secure communications, video surveillance, and connectivity, the company is trusted by leading integrators and end users alike to deliver systems that perform — even in the most demanding environments.
Established with a clear vision to bridge best-in-class global technologies with local execution, Tabbara Electronics has grown into a strategic distribution partner serving mission-critical sectors across the region. The company represents some of the most respected brands in the world, including Motorola Solutions, Pelco, Avigilon, and
Barrett Communications, and is known for its technical depth, strong ethics, and longterm commitment to its partners.
“What sets us apart isn’t what we sell — it’s what we build around it. Tabbara Electronics has always moved with clarity and purpose, turning a clear vision into regional impact. That’s how we lead — and that’s how we will continue to shape the future,” says Mohamad Tabbara, CEO of Tabbara Electronics.
The company is more than a distributor. It acts as a technical partner that equips system integrators, resellers, and service providers with the tools, knowledge, and confidence to deliver autonomously — en-
abling them to scale with independence and agility in their respective markets. From pre-sales engineering to after-sales support, Tabbara’s relationships are built on trust, collaboration, and performance that lasts well beyond delivery.
At the core of Tabbara Electronics’ value lies its ability to unify essential technologies into a cohesive, mission-ready ecosystem. The company’s portfolio is carefully composed of globally recog-
Whether supporting a national security agency, a smart city initiative, or a transportation network, Tabbara Electronics ensures every solution aligns with the mission at hand — technically, operationally, and in full regulatory compliance
nized brands that deliver secure voice communication, intelligent surveillance, long-range connectivity, and high-capacity backhaul — all tailored to meet the diverse operational needs of its regional customers.
From Motorola Solutions’ P25, TETRA, DMR, HF and LTE radio systems and dispatch platforms, to AI-enabled surveillance by Avigilon and Pelco, to the tactical HF capabilities of Barrett Communications, every solution is backed by deep product knowledge and a focus on field reliability. These systems are further supported by robust microwave
and wireless transport options, ensuring seamless transmission of critical data, video, and voice — even in the most remote or infrastructure-limited areas. Whether supporting a national security agency, a smart city initiative, or a transportation network, Tabbara Electronics ensures every solution aligns with the mission at hand — technically, operationally, and in full regulatory compliance.
Tabbara Electronics continues to evolve its offerings to meet the needs of a rap-
idly changing landscape. The company embraces emerging technologies such as AI analytics, encrypted communications, edge computing, and open-platform architecture — while remaining anchored in its core values of transparency, ethics, and regional alignment.
Tabbara also explains that the company doesn’t simply import equipment — it enables tangible, lasting outcomes by empowering partners to design, implement, and sustain solutions with a high degree of autonomy, backed by expert support at every stage.
With a footprint across the Gulf and broader MENA region, Tabbara Electronics supports projects that require technical precision, rapid response, and regulatory alignment. Its solutions are fieldtested and supported by in-region experts who understand the urgency of on-ground operations.
The company’s ability to maintain local inventory, offer fast delivery, and support custom configurations provides a distinct advantage in environments where downtime is not an option.
As demand for secure, integrated systems continues to grow, Tabbara Electronics is doubling down on its commitment to the region, expanding its portfolio, strengthening partnerships, and investing in technical talent. The company’s strategy remains clear: deliver globally trusted technologies with regional expertise and full lifecycle support.
From tactical radios to intelligent surveillance, from rugged HF systems to microwave backhaul, Tabbara Electronics is not just keeping pace with the future. It is helping define it.
Through this model, Tabbara Electronics ensures that its partners are not only equipped, but empowered — with the autonomy, expertise, and backing needed to succeed in complex environments. n
The perfect solution for morgues, coroners and forensic centers
The FOBOS XR is an advanced system capable of capturing high-resolution X-ray images of a body for non-invasive forensic pathology examinations. With the ability to capture detailed and clear images, it enables pathologists to determine causes of death and to assess the damage caused by trauma. The FOBOS XR Body Scanner can provide detailed analysis that is required for research into human tissue, organs and bones that are often outside of traditional imaging capabilities. You can use this device for the examination of road traffic accidents, suicide cases, as well as homicides, drownings, or other difficult situations.
The seventh edition of Intersec Saudi Arabia, featuring increased government support, will be held at the Riyadh International Convention and Exhibition Centre (RICEC) from 29 September to 1 October. Intersec Saudi Arabia will showcase innovations in security, safety and fire protection, hosting industry experts from around the world
n By: Walid Abdulmoti Marketing Manager, Messe Frankfurt Middle East GmbH
Intersec Saudi Arabia, the premier industry platform for security, safety and fire protection, will return to the Riyadh International Convention and Exhibition Centre (RICEC) from 29 September to 1 October.
Aligning global innovation with national priorities, Intersec Saudi Arabia brings together government authorities, industrial leaders and international solution providers to secure the infrastructure, environments and communities building the nation’s prosperous future.
Pivotal moment in Saudi Arabia’s evolution
Organised by 1st Arabia and licensed by Messe Frankfurt, Intersec Saudi Arabia will be held in association with a range of government entities under the theme Securing progress, igniting safety: Unveiling tomorrow’s solutions for Saudi Arabia. With a series of giga-projects underway in Saudi Arabia, including Neom, Qiddiya,
The Fire Protection and Technology Summit at Intersec Saudi Arabia will gather the most prominent fire and emergency service leaders from across the region to address key challenges, opportunities, standards, policies, and technologies.
After a record-breaking edition in 2024, this year’s show reflects even greater momentum. Over 370 exhibitors from more than 35 countries will showcase over 1,000 brands across 7 halls and a dedicated outdoor area
and Red Sea Global, and major global events on the horizon, such as Expo 2030 and the 2034 FIFA World Cup, the Kingdom is undergoing a significant transformation. Together, these developments mark a pivotal moment in Saudi Arabia’s evolution, positioning it as a key player in global tourism, sports, and industry.
Bilal Al Barmawi, CEO and Founder of 1st Arabia Trade Shows & Conferences, said: “Intersec Saudi Arabia provides an important platform for decision makers across Saudi Arabia’s major projects to connect with global innovators and work together to build a secure, future-ready environment. We look forward to facilitating important business connections that support the country’s growth and longterm success.”
After a record-breaking edition in 2024, this year’s show reflects even greater momentum. Over 370 exhibitors from more than 35 countries will showcase over 1,000 brands across 7 halls and a dedicated outdoor area. With exhibition space now totalling 30,000 sqm, and more than 27,000 visitors expected, Intersec Saudi Arabia 2025 continues to grow in both scale and impact.
The show presents a comprehensive showcase across 5 product sectors: Commercial & Perimeter Security, Homeland Security & Policing, Fire & Rescue, Safety & Health, and Cybersecurity, and features rich learning and engagement opportunities. Our CPDcertified content theatres include the Future Security Summit (Powered by ASIS International Middle East) and the Fire Protection & Technology Summit, each offering deep insights into the critical topics shaping our industries.
The Future Security (Powered by ASIS International Middle East) will explore emerging global threats, crisis response strategies, and responsible AI innovation.
Intersec Saudi Arabia is organised by 1st Arabia, licensed by Messe Frankfurt
Key speakers from FIFA, Red Sea Global, Diriyah Company, Kearney, and Saudi Aramco will lead high-level discussions and share practical insights to advance industry dialogue.
The Fire Protection and Technology Summit at Intersec Saudi Arabia will gather the most prominent fire and emergency service leaders from across the region to address key challenges, opportunities, standards, policies, and technologies. During the summit, attendees will gain valuable insights from Saudi Civil Defense, International Maritime Industries, and AESG alongside other industry experts.
Riham Sedik, Exhibition Director, Intersec Saudi Arabia, Messe Frankfurt Middle East, said: “The conference and events element of Intersec Saudi Arabia continues to grow each year and will once again bring together the brightest minds in security, safety and fire protection from around the world. The event will offer interactive showcases, live demonstrations and engaging panel discussions, all tailored to the unique needs of the Kingdom.”
Intersec Saudi Arabia will be held in Halls 1-7 at RICEC and a purpose-built outdoor area. The event comprises five product sectors, which include Commercial & Perimeter Security, Homeland Security & Policing, Fire & Rescue, Safety & Health and Cybersecurity. n
Key Security Events in 2023
8 - 9 Oct. 2025, Skopje, North Macedonia
Adria Security Summit 8-9 October 2025, Skopje, North Macedonia
https://www.adriasecuritysummit.com
Gitex Global 13-17 Oct 2025, Dubai, UAE
https://www.gitex.com/home
ISAF
8-11 October 2025, Istanbul, Turkey
https://www.isaffuari.com/en
OFSEC
11-12 Nov 2025, Muscat, Oman
https://www.ofsecevent.com
Romanian Security Summit
5-6 Nov 2025, Bucharest, Romania
https://romaniansecuritysummit.com
BLACKHAT MEA
2-4 Dec 2025, Malham, Saudi Arabia
https://blackhatmea.com
Intersec Dubai 12-14 Jan 2026, Dubai, UAE
https://intersec.ae.messefrankfurt.com/dubai
DIMDEX
19-22 Jan 2026, Doha, Qatar
https://dimdex.com
Vendor-neutral Physical Security Information Management (PSIM) Bosch empowers you to build a
Advancis Middle East
P.O. Box 73309
Abu Dhabi, United Arab Emirates
Tel. +971 2 444 2503
Email: info@advancis.ae Web: https://advancis.net
www.assaabloy.com/ae/en patricia.lomboy@assaabloy.com
Man Guarding
Technical protection
• Video surveillance
• Access control
• Intrusion detection
• Item theft protection
• IP and network solutions
• Perimeter protection
• Fire detection
• Gas detection
Mechanical protection Cash/valuables-in-transit
Cyber security
Digital forensics
Software solutions
Smart home Internet of things
Security management Investigations
Building management
Market research
Legislation and standards
www.assaabloy.com
https://www.genetec.com
www.hidglobal.com
www.idisglobal.com
www.issivs.com
https://javelintactix.com
www.linevsystems.com
www.supremainc.com
•
•
•
ICT o ers a unified solution for access control, intrusion detection, and building automation - whether you are dealing with a small business or a large-scale enterprise project with thousands of doors and complex requirements.
With native support for mobile credentials, video intercoms, lift integration, and a wide array of built-in features, the Protege systems mean you can track where people are, see who’s at the door, and respond to incidents from one single, easy-to-use platform.