a&s Middle East No.17

Page 1


Effectively protecting people and property from fire can be complex. Advanced simplifies the challenge without compromising on safety.

Whether you need powerful networking, smoke control and fire audio for large-scale UL projects; extinguishing control and fire system redundancy for critical sites; or fast, fuss-free EN solutions for smaller, wireless installations, Advanced brings you fire safety peace of mind.

banking, healthcare, and government, organizations are embracing contactless biometrics for faster, safer, and more convenient authentication. The touch-free revolution is reshaping how we prove who

INTERVIEW

18 Mohamed ElShenawy, Managing Director of Suprema

68 Higher Security and Efficiency Smarter Access Control in Healthcare

70 Adopted Across the Region The AI Video Innovations Offer Impressive Value for Users

72 Navigating the Security Maze Modern Access Control Challenges in Data Centers

74 Keeping the World Talking Driving Secure Transformation Across the MENA

76 Smarter Against Fire Bosch Meets Middle East’s Hospitality Boom

80 Leading Regional Platforms ISAF Continues to Attract Intense Interest

EDITOR‘S WORD

Professional media for complete security solutions

Management

Mahir Hodžić, General Manager mahir.hodzic@asmideast.com

Adis Hodžić, CEO adis.hodzic@asmideast.com

Editorial Staff

Damir Muharemović, Editor-in-Chief mahir.hodzic@asmideast.com

Mirza Bahić, Associate Editor mirza.bahic@asmideast.com

Dženana Bulbul, Assistant Editor editorial@asmideast.com

Orhan Hadžagić, Journalist orhan.hadzagic@asmideast.com

Fatima Al Husseiny, Journalist editorial@asmideast.com

Roman Ivanković, Journalist editorial@asmideast.com

Art Staff

Sanel Palislamović, Art&Design Editor sanel.palislamovic@asmideast.com

Nelmedin Kolubara, DTP&Art Design dino.kolubara@asmideast.com

Sales Amar Pap, Business Development Manager amar.pap@asmideast.com

International Sales Israel Gogol, International Sales Director Israel.Gogol@taiwan.messefrankfurt.com

International Associates

Qatar – Mirsad Selimović, mirsad@techman.qa

a&s Middle East offers the latest news and insights on video surveillance, access control, intrusion detection, fire alarm, mechanical protection, man guarding, cyber security, artificial intelligence, IoT, big data, smart homes and buildings, industrial automation, information, communication technology to Middle East region professional channel players.

a&s Middle East is part of the media network of the Messe Frankfurt Ltd – Taiwan Branch, which offers several media platforms — asmag.com and a&s magazines, published in English, traditional Chinese, and three other languages, providing the most comprehensive industry trends, product, and supply chain information. The total annual circulation is approximately 515,000 copies around the globe.

a&s Middle East is published 6 times a year, Jan/Feb, March/ April, May/June, July/August, Sept/Oct, and Nov/Dec.

Payment Instructions

Annual subscriptions are payable in USD, EUR, or AED. Subscription inquiries per your request.

EUR: AE340400000653005131002

Account No. 0653005131002

USD: AE070400000653005131003

Account No. 0653005131003

AED: AE610400000653005131001

Account No. 0653005131001

Copyright Statement

© Copyright by Privus Agency Ltd. All rights reserved. Any republication, copying, redistribution, or reproduction of the magazine in any form, including electronic, without the prior written consent of the publisher, is prohibited. Advertisers are solely responsible for the content of advertising material. The publisher bears no responsibility regarding possible legal, patent, content, or brand disputes of the advertiser.

Legal Disclaimer

The information in this magazine has not undergone any formal testing by Privus Agency Ltd. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While this information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments.

Corporate Address

Privus Agency FZ-LLC JT010006, Al Shohada Road, Ras Al Khaimah, UAE

Tel: +971 58 983 4258

Web: www.asmideast.com

Next-Gen Technologies, Next-Level Events

Welcome to the latest edition of a&s Middle East, where we explore the technologies and strategic developments that are reshaping the security landscape across our region and beyond. In this edition, we turn our attention to Intersec Saudi Arabia 2025, a forward-looking platform for safety, security, and fire protection professionals. Alongside this event, in our cover story we examine equally forward-looking contactless biometric technologies that are transforming identity verification across multiple industries. We also feature an in-depth article on the Saudi security market, highlighting its growth drivers and emerging opportunities.

Speaking of industries, we highlight the Kingdom’s rapidly evolving security landscape. Saudi Arabia’s security market is projected to grow to USD 2.8 billion, driven by Vision 2030 initiatives. The country’s biometrics sector alone is expected to reach USD 1.35 billion by 2033, prompting us to explore these transformative technologies in detail. This remarkable growth underscores the increasing role of advanced security solutions in the region. For industry professionals, innovators, and policymakers, Intersec Saudi Arabia 2025 represents not just an exhibition but a critical opportunity to witness, engage with, and shape the future of security. As technologies like contactless biometrics continue to evolve, the region is poised to become a global benchmark for intelligent, efficient, and secure solutions that extend far beyond its borders.

Marketing: marketing@asmideast.com WANT TO RECEIVE THE MAGAZINE AT YOUR DOORSTEP?

Please visit our official website www.asmideast.com and select ‘Subscribe Now’ option under THE MAGAZINE menu.

Subscription includes all six editions.

Digital edition is FREE and readily available at the official website.

Damir Muharemovic, Editor-in-Chief

UNIFYING ACCESS. UNIVERSAL READERS FOR ANY APPLICATION.

MEET ELATEC AT INTERSEC SAUDI ARABIA

29 Sept - 1 Oct 2025 | Riyadh, KSA Booth 2-A18

In a world of ever-evolving access challenges, security professionals need technology that keeps up. ELATEC enables user authentication and identification solutions worldwide. Together with its global partners, the company develops innovative and future-proof access systems. Combining pioneering universal readers, advanced authentication software, and world-class service and support, ELATEC boosts secure, flexible access management – from physical access control to digital access management, machine authentication, secure printing, EV charging, and more.

ELATEC’s comprehensive portfolio of multi-technology readers supports more than 60 transponder technologies (including LF and HF RFID, NFC, and BLE) and 99 physical and mobile credentials. The readers are remotely configurable and updatable, ensuring seamless interoperability and adaptability to evolving market needs. ELATEC collaborates with OEMs, integrators, and organizations to design customized access solutions that enhance security, improve user convenience, and simplify management.

Founded in 1988 and based in Munich, ELATEC operates at 19 global locations. Its Middle East hub, ELATEC Middle East Trading FZE in Dubai, is led by Managing Director Carsten Hoersch and supports regional partners and customers.

ELATEC MIDDLE EAST TRADING FZE

P.O. Box 16868 | Dubai | United Arab Emirates

Phone: +971 50 932 2691

Mail: middle-east-info@elatec.com

YOUR BENEFITS AT A GLANCE

37+ years of experience

Compatible with 60+ transponder technologies

Quality at 19 locations worldwide

Support of 99 physical and mobile credentials

Remotely configurable and updatable

Certified in up to 110 countries

Partnerships with specialized providers such as HID Global, LEGIC, and NXP

KSA CYBER SECURITY MARKET PROJECTED TO REACH USD

17.5 BILLION BY 2030

The Saudi Arabia Cyber Security market was valued at USD 6,940 Million in 2024 and is projected to grow to USD 17,534 Million by 2030, with a compound annual growth rate (CAGR) of 17.0% from 2025 to 2030. The cybersecurity market in Saudi Arabia encompasses a wide array of technologies, services, and strategies designed to protect digital infrastructure, data, and communication systems from cyber threats.

This market addresses the mounting need to safeguard government entities, businesses, and individuals against increasing risks such as malware, ransomware, phishing attacks, data breaches, and advanced persistent threats. With the acceleration of digital transformation across various sectors in Saudi Arabia including banking, healthcare, oil and gas, retail, and telecommunications the demand for robust cybersecurity solutions has intensified. Organizations are investing in firewalls, intrusion detection systems, endpoint security, identity and access management, cloud security, and managed security services to

bolster their defenses. Regulatory frameworks and national strategies have played a significant role in shaping the cybersecurity landscape, mandating stricter compliance measures and fostering collaboration between public and private sectors.

The Saudi Arabia Cyber Security Market

is evolving rapidly, integrating emerging technologies such as machine learning and blockchain to combat sophisticated cyber threats. Consequently, the cybersecurity sector in Saudi Arabia is becoming increasingly integral to national security and business continuity strategist. n

GENETEC STILL DOMINATE VIDEO SURVEILLANCE SOFTWARE MARKET

Genetec, the global leader in enterprise physical security software, announced that it continues to lead the global video surveillance software market, according to newly published reports from independent industry analyst firms, Omdia and Novaira Insights.

According to Omdia’s 2025 Video Surveillance & Analytics Database Report, Genetec retained its #1 position worldwide in video surveillance software, and is also ranked #1 globally in

the broader category that combines video surveillance software and Video Surveillance as a Service (VSaaS). Genetec’s long-term investment in open, scalable, and cyber-secure cloud solutions is also recognized in the newly introduced VSaaS category. The growing customer adoption of Security Center SaaS, launched in mid-2024, has helped propel Genetec into the top 10 globally for VSaaS, including a #4 ranking in the Americas, the largest and fastest-growing VSaaS market worldwide. The company is seeing strong momentum across its unified VSaaS and Access Control as a Service (ACaaS) offerings, as security professionals increasingly seek unified, cloud-based deployment options. Regionally, for video surveillance and for combined video surveillance and VSaaS categories, Genetec held the top spot in the Americas for the 14th consecutive year. In EMEA, the company maintained its #2 position, achieving the largest market share growth among the top 10 vendors, and ranked #3 in Asia Pacific*.

“The video surveillance market continues to see steady global growth, driven by rising security demands and faster adoption of new technologies,” said Scott Foley, Senior Analyst, Physical Security at Omdia. “According to our research, Genetec remains a consistent global leader in the industry for video surveillance software, maintaining top market share and addressing customer needs with innovative products that meet the evolving needs of organizations worldwide.” n

JAPANESE GOVERNMENT FUNDED JORDAN’S BORDER SECURITY PROJECT WITH A TOTAL VALUE OF USD 18.4 MILLION

The Jordanian and Japanese governments signed a memorandum of understanding worth some USD 7 million to support the fourth phase of the Border Security Enhancement Project, under Japan’s Economic and Social Development Programme. The agreement aims to boost the operational capacities of Jordan’s border centres and upgrade their security systems through the development of a unified national database that will improve monitoring and tracking capabilities.

Minister of Planning and International Cooperation Zeina Toukan and Japanese Ambassador to Jordan Hideki Asari signed the MoU in the presence of several officials from the Japanese embassy. Toukan expressed her gratitude for Japan’s continued support of Jordan’s development and modernisation efforts, highlighting the importance of bilateral ties and joint commitment to enhancing economic and developmental cooperation.

Asari reiterated the Japanese government’s commitment to continuing the provision of various financial and technical support programmes to Jordan across multiple areas of mutual interest.

He stressed that such support contributes to further boosting relations between the two nations, in addition to bolstering Jordan’s border security.

The diplomat noted that the initiative will enhance the operational capabilities of personnel at border crossings, pointing out that this contribution represents the fourth instalment under the Economic and Social Development Programme. Asari also praised Jordan’s steadfast role in promoting peace and stability in the region, despite ongoing and complex security challenges.

To date, the Japanese government has funded three previous phases of the project with a total value of some USD 18.4 million. Since 1999, Japan has extended total aid to Jordan amounting to USD 2.2 billion, including USD 656.12 million in grants, with the remainder provided as concessional loans, alongside technical assistance delivered through the Japan International Cooperation

GROUP-IB SUPPORTS INTERPOL’S “OPERATION

SERENGETI 2.0” LEADING TO ARREST OF 1,209 CYBERCRIMINALS ACROSS AFRICA

Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced that it has contributed to INTERPOL’s “Operation Serengeti 2.0” between June and August 2025. The multinational operation resulted in the arrest of 1,209 cybercriminals across Africa, targeting nearly 88,000 victims globally, and the recovery of USD 97.4 97.4-million. During the operation, investigators from 18 African countries and the United Kingdom also dismantled 11,432 malicious infrastructure and networks used to facilitate ransomware attacks, online scams, and business email compromise (BEC). These prominent threats were also highlighted by Group-IB in the recent INTERPOL Africa Cyberthreat Assessment Report.

As an INTERPOL Gateway Partner, GroupIB contributed circumstantial intelligence on a cryptocurrency investment scam and details of the malicious infrastructure linked to the scheme. Group-IB also provided INTERPOL and its investigators

with findings relating to the infrastructure connected to business email compromise (BEC) campaigns, as well as broader intelligence on malicious infrastructure hosted across the African region.

In the lead-up to “Operation Serengeti 2.0”, Group-IB also conducted a series of practi-

cal workshops on open-source intelligence tools and techniques, as well as knowledge sharing on dark web investigations. These workshops helped to enhance the skills and expertise of investigators, directly contributing to the effectiveness of the investigations and overall operational success. n

OVER 12,000 WI-FI BREACHES RECORDED IN UAE IN 2025

The UAE Cyber Security Council has reported over 12,000 Wi-Fi breaches in 2025, accounting for nearly 35% of all cyberattacks in the country. These incidents stem largely from users connecting to unsecured public networks, which hackers exploit to steal passwords, banking details, and personal data. The Council urges caution when using free Wi-Fi, especially in public places like cafes and airports, and recommends key safety measures: using reliable VPNs, enabling safe browsing features, and avoiding sensitive transactions on open networks.

Dr. Mohammed Al Kuwaiti emphasized the UAE’s commitment to building a secure digital environment through awareness

campaigns like Cyber Pulse. The Council warns that many users underestimate the risks of public Wi-Fi, which can be used to intercept data, redirect users to fake sites, and install spyware. Strengthening cybersecurity culture and adopting preventive tools are essential to safeguarding digital identity in today’s interconnected world. n

ARTIFICIAL INTELLIGENCE COULD FACE STRICT OVERSIGHT, WARNS OPENAI CEO

OpenAI CEO Sam Altman has warned that the world may be on the verge of a “fraud crisis” fueled by artificial intelligence. Speaking to U.S. media, Altman said AI has already defeated most traditional authentication methods, pointing to banks that still rely on voice recognition as a serious risk. He cautioned that criminals are increasingly able to use AI-generated voices and videos to impersonate people and carry out scams.

The FBI and U.S. officials have previously reported cases of AI voice cloning used to trick parents and even attempts to impersonate senior government leaders. Altman predicted that what begins with phone calls will soon escalate into video interactions indistinguishable from reality. “I am very nervous that we have an impending, significant fraud crisis,” Altman told the audience. His remarks come as the White House prepares to release its “AI Action Plan,” a strategy for regulating artificial intelligence and ensuring U.S. leadership in the field. OpenAI has been active in Washington, confirming that it will open a new D.C. office early next year with about 30 employees. The office will serve as a hub for policy engagement, training programs, and research on AI’s economic impact.

On jobs, Altman said predictions about AI’s economic impact are uncertain, though he expects some jobs to vanish while new

OMAN UNVEILS STRATEGIC

forms of work emerge. He suggested that in the distant future, many people may no longer hold “real jobs” but instead create roles to feel useful and maintain social value.

OpenAI also released a report by its chief economist comparing AI’s impact to transformative technologies such as electricity and the transistor. The report notes that ChatGPT now has around 500 million global users, with many young Americans turning to the tool for learning and upskilling. n

TECH VISION AT COMEX 2025, ANCHORED IN AI AND CYBERSECURITY

Oman has launched a bold new chapter in its digital transformation journey with the opening of COMEX 2025, the Sultanate’s flagship technology exhibition. Inaugurated by His Highness Sayyid Shihab bin Tarik al Said, Deputy Prime Minister for Defence Affairs, the four-day event showcased Oman’s ambition to become a regional leader in artificial intelligence, cybersecurity, and space innovation.

Organized by Al Dar Al Arabiya for Data Analysis and supported by the Ministry of Transport, Communications and Information Technology (MoTCIT), COMEX 2025 featured over 140 startups, 200 companies, and multiple international delegations.

The event served as a platform for unveiling strategic initiatives aligned with Oman Vision 2040, including the Digital Triangle Project, a dedicated AI zone, and the Green AI Alliance—an initiative fostering collaboration between government, academia, and the private sector.

Among the highlights was the launch of “Maeen,” Oman’s first AI language model, designed to enhance digital sovereignty and streamline government services. The unveiling of 30 new services on the Unified Digital Services Portal, a smart assistant, and the National Open Data Portal further underscored Oman’s commitment to citizen-centric digital governance. n

GLOBAL BATTERY TECHNOLOGY MARKET SET FOR STRONG GROWTH THROUGH 2030

The global battery technology market was valued at USD 213.36 billion in 2024 and is expected to grow from USD 252.13 billion in 2025 to USD 431.65 billion by 2030, registering a CAGR of 11.4%, according to the latest report by MarketsandMarkets. Growth is being driven by the rising demand for reliable and sustainable energy storage to support electrification, renewable integration, and clean mobility.

Asia-Pacific is projected to account for the largest market share in 2025, fueled by large-scale EV adoption, strong government policies, and massive investments in battery production facilities.

Countries such as China, Japan, South Korea, and India are expanding gigafactories, recycling infrastructure, and advancing next-generation solid-state and sodium-ion technologies.

Lithium-ion batteries continue to dominate due to their high energy density and proven reliability, but alternatives such as solidstate and sodium-ion are gaining traction. These new technologies promise faster charging, longer life cycles, and lower long-term costs. However, high manufacturing costs remain a major obstacle to the large-scale commercialization of solidstate batteries.

Sodium-ion batteries are attracting attention thanks to the abundance of raw

materials and reduced supply chain risks, making them appealing for grid-scale storage and renewable energy integration. By contrast, lead-acid batteries face declining relevance due to limited capacity and shorter lifespans.

Leading global players include China’s CATL and BYD, South Korea’s LG Energy Solution and Samsung SDI, Japan’s Panasonic and Mitsubishi Electric, as well as

Tesla and Clarios from the United States. These companies are investing heavily in R&D, partnerships, and capacity expansions to secure their market leadership. As highlighted in the MarketsandMarkets report, the surge in EV adoption and the global push for sustainable energy solutions position battery technology as a cornerstone of decarbonization and carbon neutrality efforts worldwide. n

WHATSAPP FIXES SECURITY FLAW IN IOS AND MACOS APPS

WhatsApp has released fixes for a critical vulnerability in its iOS and macOS apps that may have been exploited in targeted attacks. The flaw, tracked as CVE-2025-55177, stemmed from insufficient authorization in linked device synchronization

and was discovered by WhatsApp’s internal security team. Meta said the bug could have allowed attackers to process malicious content from arbitrary URLs on a victim’s device. The issue affected WhatsApp for iOS before version 2.25.21.73, WhatsApp Business for iOS 2.25.21.78, and WhatsApp for Mac 2.25.21.78, all patched in late July and early August. Researchers believe the weakness may have been chained with CVE-2025-43300, a zero-day in Apple’s ImageIO framework that was recently exploited to target individuals.

Amnesty International reported that WhatsApp has alerted certain users who may have been targeted in spyware campaigns over the past three months. The company advised affected individuals to perform a full device reset and ensure their operating system and apps remain updated. “This is a classic example of a zero-click attack, where no user interaction is needed to compromise a device,” said Donncha Ó Cearbhaill, head of Amnesty International’s Security Lab. He warned that this spyware continues to pose serious risks to journalists, activists, and human rights defenders. n

Elevate Your Surveillance Operations

The new IDIS Edge AI Plus Camera range takes security and safety to a new level of efficiency for real-time monitoring and incident review

Supercharge your security and safety operations with the IDIS Edge AI Plus Camera range. It features IDIS A-Cut Monitoring and IDIS Deep Learning Analytics (IDLA) Pro event functions - including crowd detection, abandoned object, removed object and fall detection. These new functions enable faster investigations and response times thanks to automatic image cropping, intuitive attribute searches, and advanced automated alerts, as standard.

IDIS VIDEO ANALYTICS POWER DEFACTO’S BUSINESS EXPANSION

Fashion retailer DeFacto is one of the best-known and most successful clothing brands in Türkiye, with a program of rapid expansion since its launch in 2004. This expansion has seen new branches prosper in Europe, the Middle East, Africa, and Central and Southeast Asia – and advanced video analytics are playing a role in the company’s success, with a solution from IDIS and its integration partner Secom Türkiye.

With many new locations being added each year, DeFacto is making significant investments in the use of advanced technol-

ogy to drive efficiency and a focus on providing positive customer experiences.

Video surveillance is a key technology for DeFacto, but the camera systems it previously used were proving to be an obstacle to innovation. To support its expansion mission, DeFacto needed a new video solution that would deliver powerful AI functionalities and enable improved, centralized control.

Understanding the value of AI analytics for business intelligence, as well as for loss prevention, DeFacto also sought a video technology that would be easy to integrate with its broader business information systems.

To support management decision-making, the company prioritized a more accurate and affordable solution for people counting, conversion rate measurement, and capture rate analysis. DeFacto turned to IDIS and its systems integration partner, Secom Türkiye, for a solution that would combine the latest capabilities with the most competitive lifecycle value (lowest TCO).

A proof of concept (POC) demonstrated that IDIS 5MP Fisheye cameras can achieve complete scene coverage of DeFacto outlets, typically spanning over 3000 sqm, with fewer cameras. Reducing the number of cameras required significantly reduced costs, with less cabling, fewer switch ports, and minimized installation and maintenance time.

Following the POC, a phased migration program allowed the old system to continue in operation as the new system was rolled out store by store, with IDIS VMS providing a stable and userfriendly operating platform. n

UAE LAUNCHES NATIONWIDE ANTI-FRAUD CAMPAIGN TARGETING DIGITAL THREATS

The UAE Ministry of Interior, Dubai Police, and Visa have jointly launched a nationwide campaign titled “Don’t Talk to Strangers Has No Age Limit”, aimed at combating rising digital fraud and e-crime across the Emirates.

The initiative comes amid growing concerns over sophisticated scams targeting consumers via mobile phones and social media platforms. The campaign emphasizes digital literacy and shared responsibility, with Brigadier Abdul Aziz Al-Ahmad of the Federal Criminal Police highlighting the importance of public-private partnerships in securing the digital ecosystem.

Visa’s Vice President for UAE, Salima Gutieva, noted that empowering users with knowledge is the first line of defense. The campaign draws on insights from Visa’s latest Stay Secure study, which revealed persistent vulnerabilities despite increased consumer awareness.

A 360-degree rollout includes social media, out-of-home advertising, and direct engagement in schools and labor communities. Educational content is tailored by nationality and fraud type, reflecting a data-driven approach to public outreach.

Visa reports blocking $40 billion in fraudulent payment value globally over the past year, underscoring the urgency of proactive fraud prevention strategies powered by AI and cross-sector collaboration. n

IronLink® hardware is engineered and tested to exceed industry standards, ensuring superior performance and durability in mission-critical scenarios. PERFORMANCE + RELIABILITY

From video recording servers to industrial networking devices, IronLink® products are designed with flexibility in mind, allowing us to build for your exact specification. CUSTOMIZABLE SOLUTIONS

IronLink® solutions leverage Tier 1 OEM hardware from trusted brands like Dell, Intel, & NVIDIA to deliver enterprise-grade quality, shipped quickly for immediate deployment. ENGINEERED FOR SUCCESS

As trusted partners of

Velasea ensures that our products integrate the latest

and highest performance standards. With our expertise and worldclass partnerships, we provide the technology that powers progress at the edge, keeping your business running efficiently. BUILT WITH THE BEST

HOW OUR SEVENYEAR JOURNEY ENDED IN 300% REVENUE GROWTH

Speaking to a&s Middle East, Mohamed ElShenawy, Managing Director of Suprema Middle East FZCO, explains how Suprema evolved from distribution dependence to regional leadership through cloud-based biometrics, AI-driven security technologies, and strategic expansion into Middle East, Turkey, and Africa

Suprema

a&s Middle East: Could you please share some background about yourself, your career path, and your current role at Suprema?

ElShenawy: My name is Mohamed ElShenawy, and I’m the Managing Director at Suprema Middle East FZCO. I’m responsible for our operations across the META region and CIS countries, which includes the Middle East, Turkey, Africa, and the CIS.

a&s Middle East: How would you describe Suprema’s business operations and strategy in the Middle East? What have been the key successes or challenges in that region?

ElShenawy: Suprema Inc. established the Suprema Middle East office as a subsidiary back in July 2017. At this time, we were fully dependent on our distribution channels in the Middle East, with no direct interactions with end users, and we were not present in all the market segments. We conducted a complete market gap analysis and the areas for improvement with an action plan. That was the beginning of Suprema Middle East’s success story. The sales revenue generated by Suprema Middle East has grown by 300% over the past seven years of hard work, which led our headquarters, Suprema Inc., to recognize us as a very reliable and target-oriented regional office. Looking at the numbers and the achievements made, Suprema Inc. decided to assign additional countries to Suprema Middle East starting in 2025, namely Africa, Turkey, and the CIS countries. So, our coverage has expanded from the Middle East to META + CIS, i.e. Middle East, Turkey, Africa, and the CIS. One of the key factors behind our success is being located in the Dubai Airport Freezone in the UAE, which provides flexibility, accessibility, and ease of importing and exporting goods across our assigned region.

a&s Middle East: In the Middle East, which countries currently account for the majority of Suprema’s projects, employees, or service centers? In which markets or verticals within the region

The Fastest and Most Accurate Facial Recognition Devices

a&s Middle East: With the launch of BioStation 3, you introduced advanced features like AI-optimized speed, anti-spoofing, secure element technology, and IP protection. How do these certifications and features work together to ensure trust and safety?

ElShenawy: Suprema has been well known in the market for the fastest, most reliable, and most accurate facial recognition devices. Having its own facial recognition algorithm matcher and being a very reliable hardware manufacturer has made Suprema self-dependent with no limitations. Suprema’s AI-powered facial authentication device, BioStation 3, is equipped with both infrared (IR) and RGB cameras. This dual-sensor approach ensures highly accurate authentication, further enhanced by Suprema’s AI algorithms developed by the in-house R&D team. Suprema is conducting extensive testing and training using various models, including printed photos and video captures, to continuously improve the accuracy of its AI-powered facial authentication. BioStation 3 is now our best revenue-generating product in our assigned territory. As a great value-for-money product, it allows our customers to receive the best technology at a very reasonable price. BioStation 3 is not just a facial recognition device since it has many unique features that set it far ahead of the competition, such as mobile credentials, VoIP SIP protocol, outdoor-ready IP65, PoE, and support for all types of access cards, including MIFARE, MIFARE DESFire, HID iCLASS, and HID SEOS.

BioStation 3 is now our best revenuegenerating product in our assigned territory

a&s Middle East: You recently unveiled the BioStar Air platform, embedding biometric processing at the edge to ensure fast and reliable access even during network outages. Could you explain how this edge-based architecture balances convenience, security, and cross-site consistency for users?

are you seeing the strongest performance, and why?

ElShenawy: Most of our Suprema Middle East employees are based in Dubai, UAE, mainly because of the time zone and the flexibility of the hiring process. Today, Suprema META + CIS has built a very strong presence across a wide range of segments, including government institutions such as ministries, authorities, and embassies, as well as oil and gas, education, healthcare, and banking. We are also active in residential complexes, construction sites, data centers, manufacturing plants, sports clubs, transportation hubs like airports and seaports, and retail chains.

ElShenawy: BioStar Air has opened an entirely new market segment, where customers don’t require any on-premise access control server that needs maintenance and support. BioStar AIR requires no servers to set up and no software to install. Your site can be online in minutes and fully configured in about an hour. BioStar Air is the only access control solution that natively connects the world’s most advanced biometric readers to the cloud. Cloud-based biometrics offer secure, scalable, and instant access across multiple locations without physical credentials.

a&s Middle East: Suprema has recently renewed compliance with the latest ISO/IEC 27001:2022 and ISO/IEC 27701 standards, while also maintaining CSA STAR certification. Could you discuss how these updated security and privacy frameworks enhance customer trust, especially in an era domi-

differentiate our products, and stay ahead of our competitors. Having ISO/ IEC 27001:2022 and ISO/IEC 27701 standards, as well as maintaining CSA STAR certification, has made our customers very confident in choosing Suprema products across different segments where these certificates are mandatory, such as government, oil and gas, and the banking sector.

a&s Middle East: Your open cloud integration platform, CLUe, is designed to support multi-credential authentication and centralized management. How does CLUe simplify access control for modern businesses, and what advantages does its cloud-first architecture offer compared to on-premise systems?

ElShenawy: Suprema CLUe is an open cloud integration platform built on a native cloud architecture, eliminating the need for an on-premises server. Devices connect directly to the cloud, supporting pure cloud-to-cloud server-level integration using standard REST APIs. CLUe en-

in AI, biometric access control, and cybersecurity

hances security by leveraging Suprema’s biometric access control devices and offers a mobile application or web portal for easy management and technical support. It is ideal for various membership management services, such as residential complexes, visitor management, fitness centers, shared offices, and multi-branch offices. This allows CLUe customers to focus more on their business while receiving direct support to meet all their access control needs.

a&s Middle East: Suprema’s Template on Mobile technology allows users to securely store and manage their facial authentication data directly on their phones. How does this approach ad-

technology is a very unique feature that Suprema provides. It allows Suprema biometric users to store their facial templates on their own mobile phones. This ensures full compliance with the General Data Protection Regulation (GDPR), so no biometric data is stored on our devices or on our BioStar 2 access control and time attendance server. This TOM feature is widely used in the European market, where GDPR-compliant solutions are a must.

a&s Middle East: Suprema’s collaboration with Hyundai Motor Group aims to pioneer AI-driven, robot-friendly building security solutions that integrate facial authentication with autonomous robotics. How do you envision this partnership transforming the future of physical security, and what new applications do you foresee emerging from this synergy?

ElShenawy: Suprema’s collaboration with Hyundai Motor Group aims to revolutionize the robot-friendly building security business by combining AI access

control and robotics. Together, Suprema and Hyundai Motor Group Robotics LAB have already successfully developed and deployed a security solution that integrates Suprema’s AI-based facial authentication access control technology with autonomous robots at Factorial Seongsu, Korea’s first commercialized robot-friendly building. Building on this success, the companies plan to focus on the continued development of new security services, including the implementation of specialized security form factors using robotics hardware and software technologies to further enhance physical security.

a&s Middle East: Suprema AI has developed Q-Vision Pro, an on-device AI module that uses facial recognition and behavior analysis to predict and prevent financial crimes at standalone ATMs. How does this technology enhance security for financial institutions, and what challenges does it address?

ElShenawy: The Q-Vision Pro is the world’s first on-device AI module that predicts and prevents rapidly increasing

Template on Mobile (TOM) technology allows Suprema biometric users to store their facial templates on their own mobile phones

a&s Middle East: What can customers and partners expect from Suprema in the near future in terms of technological innovation, market expansion, and new security solutions? Are there any specific trends or areas where Suprema plans to introduce new developments?

financial crimes using facial recognition and behavior analysis around standalone devices such as ATMs. By analyzing suspicious actions and utilizing facial recognition, it predicts potential crimes and prevents illegal transactions, protecting both customers and banks. Capable of handling up to 50,000 users with powerful multi-layer data encryption, it operates securely even when independent of a network. Suprema AI, recognized among Korea’s top 100 emerging AI firms in 2024 and recipient of the Minister of Science and ICT Award in 2023, contributes to a safer world.

ElShenawy: Suprema has very robust expansion plans, mostly focusing on enhancing our access control platform by providing new features to serve market needs, address the enterprise market, and win giga-sized projects. The rapid evolution of generative AI is introducing significant challenges to physical security, with deepfakes emerging as a primary concern. These AI-generated creations can realistically mimic human faces, voices, and even fingerprints, posing a substantial threat to biometric authentication systems that have long been considered highly secure methods of access control. Suprema has decided to invest heavily in R&D to drive new innovation in AI, biometric access control, and cybersecurity. n

FROM PRESIDENTIAL PROTECTION TO STADIUM SAFETY: A MODERN APPROACH TO SECURITY MANAGEMENT

Co-founder of Smart Security Consulting & Head of the Department for Prevention, Security and Integrity at the Croatian Football Federation, Mr. Jurjević brings over two decades of experience in state official protection and high-risk event security. In this interview, Jurjević shares key insights from his extensive work in close protection, largescale event coordination, and sports security management. From safeguarding world leaders to overseeing one of the largest concerts in European history, his approach reflects a comprehensive, intelligence-driven philosophy of modern security

a&s Middle East: Mr. Jurjević, could you briefly introduce yourself to our readers, with an emphasis on your education and professional background?

Jurjević: After completing the Police High School, alongside a twenty-year ca-

reer in the protection of state officials, I continued my education—first in the field of criminology, followed by earning a master’s degree in Crisis Management. Over the course of seventeen years in close protection, I had the opportunity to provide security for heads of state from all G7 countries. I carried out assignments both in Croatia and abroad, including in Russia, the United States, Egypt, Iraq, Is-

rael, Palestine, and many other countries. During that time, I progressed through all levels of responsibility, starting as a Close Protection Officer and eventually becoming Head of Security.

a&s Middle East: You have had a long and demanding career in protecting highranking officials and delegations, including international guests. What are the key

principles and methods when it comes to protecting such individuals, and how do they differ from standard security approaches?

Jurjević: There is a reason why close protection draws great attention and public interest. It’s a line of work that requires the highest level of skill, discipline, and decision-making capability. Perhaps the most challenging aspect is that in extreme situations, it is the close protection officers who take control and give instructions to some of the highest political authorities in the country or the world. It is not easy to say to your own or the American president, “Mr. President, you cannot do that, we need to leave.”

a&s Middle East: In your experience so far, how crucial has cooperation with domestic and foreign security agencies been? Can you share an example where that coordination was vital to the success of an operation?

Jurjević: In terms of close protection, cooperation with security agencies is a basic prerequisite for a successful operation. I have previously commented in the media on the arrival of state officials, for example, in Ukraine during the war, and especially during the visit of the American president Biden. Such a security operation demands maximum effort and the highest level of cooperation between American and Ukrainian intelligence services.

a&s Middle East: Today, physical security includes much more than just cameras and sensors. What are the most effective security systems you use, especially in dynamic environments with changing risk levels such as public gatherings?

Jurjević: The concept is roughly the same in all countries: security services conduct assessments, and close protection carries out the task. Risk assessment, analysis of social media, and other public sources are crucial. The influence of artificial intelligence and the ability to recognize faces or movement is increasingly being used. However, the human factor is still the most important, and I believe that despite incredible technological developments, that will never change.

a&s Middle East: Mobile security systems are an important tool for temporary or rapidly changing locations. What are

the main challenges in their implementation and integration with existing infrastructure?

Jurjević: The biggest challenges include lack of stable internet or power supply, difficult integration with existing systems, and the need for fast deployment in changing environments.

a&s Middle East: When preparing the most complex security operations, how much do you rely today on analytics, artificial intelligence, and modern security tools?

Jurjević: Analytics is unjustly overlooked, unlike close protection which is privileged and always seen front and center next to VIP individuals. Analysts are the ones doing the hardest job far from the public

eye, they are the “eyes and ears” of close protection. AI is just an additional and valuable tool used by analytics.

a&s Middle East: How important is the role of a centralized command center in managing complex security operations? Could you give us an illustrative example, such as the security management during the FIFA World Cup in Qatar?

Jurjević: In any security operation, a clearly and precisely structured hierarchy is a prerequisite for success. The FIFA World Cup in Qatar was under much scrutiny. First, due to sports reasons, it was the first World Cup held in winter. Second, due to a combination of religious restrictions and the still-present threat of a pandemic. From an organizational perspective, I was personally impressed by the World Cup

The Turkish-Syrian border during the war, 2016

The Human-Tech Balance in Risk Assessment

a&s Middle East: When it comes to securing business entities and government institutions, how do you assess threats and risks? How important is the integration of physical security with advanced technical systems?

Jurjević: For a long time now, a multidisciplinary approach has been present in the field of security. In a given area, political developments create either a secure or insecure environment, which then leads to a stable or unstable economy, ultimately influencing the quality of life. The human factor remains the most important, but we must highlight the benefits provided by technology, which we rely on and which is inevitable. I am confident that it will take on an increasingly significant role in the security sector.

and would like to congratulate everyone who worked on it. The same feeling was shared by the players and fans because everything was close and accessible.

a&s Middle East: Were there any incidents during the concert in Zagreb, and if not – what specifically contributed to that outcome? How much of it was due to preparation, and how much to operational discipline on the ground?

Jurjević: Our greatest advantage was that we understand the mentality of the audience attending this concert. There have never been any incidents at such events before. Statistically, with such a large number of people, health-related issues are to be expected. But through an innovative approach in organizing the concert space and dividing it into sectors, we ensured that emergency services could reach any person within five minutes. In the end, the concert concluded without any serious health issues, although there were around 1,000 minor medical interventions.

a&s Middle East: As the Head of the Department for Prevention, Security and Integrity of the Croatian Football Federation, what are the key security elements in planning the protection of major sports events, such as international matches or high-risk derbies?

Close protection is a line of work that requires the highest level of skill, discipline, and decision-making capability. Perhaps the most challenging aspect is that in extreme situations, it is the close protection officers who take control and give instructions to some of the highest political authorities

Jurjević: Football sparks a unique passion, I dare say it’s the same across all continents. The cooperation between the football federation, clubs, and state institutions is key. Since clubs have the greatest influence on supporters, we developed a protocol with clearly defined rules to ensure that high-risk matches are held under safe conditions, and so far, we are on the right path.

a&s Middle East: How do you assess the risk of potential clashes between supporter groups? What preventive measures are put in place?

Jurjević: We work closely with the police, who play a leading role in monitoring supporter groups, analyzing potential threats, and implementing preventive measures to avoid conflict. However, as I’ve emphasized before, the main responsibility lies with the football clubs them-

selves. They have the greatest influence on their fans, and we actively encourage them to take ownership of that role. For example, the two biggest football clubs in Croatia together have over two million followers on social media and nearly 200,000 registered members. When you compare that to Croatia’s total population of 3.8 million, it becomes clear just how significant their impact is.

a&s Middle East: Has the use of biometric identification or electronic ticketing contributed to increased safety at sporting events? How do you prevent individuals under stadium bans from entering?

Jurjević: Yes, significantly. In addition to improving safety, biometric identification and electronic ticketing also enhance the overall value of sporting and other large-scale events from a multidisciplinary perspective. These systems

Match between Croatia and France, Nations League, 2022

provide clearer insights into the habits and preferences of attendees, which benefits not only security operations but also marketing and other branches of the industry.

Croatia has one of the most rigorous legal frameworks in this area. Nevertheless, we have not yet achieved the results we are aiming for. Other European countries are facing similar challenges. However, with the introduction of new technologies, especially AI tools and advanced video surveillance we are already seeing better results than before.

a&s Middle East: When organizing events attended by tens of thousands of people, cooperation with police, fire departments, and emergency services is essential. What does this coordination look like? How early do preparations begin, and how is communication managed during the event itself?

A New Crowd Management Tool in Action

a&s Middle East: One of the biggest concerts in European history was recently held in Zagreb – the Marko Perković Thompson concert. What were the key security measures you implemented for this event, and what were the main challenges?

Jurjević: The very fact that half a million people attended the concert was the greatest security challenge, especially considering that we had never encountered anything of this scale before. A key role was played by the MPT mobile application, developed by the organizer, who is also the owner of the Croatian IT company Stack Wizard. In collaboration with them, we created an excellent crowd management tool that greatly assisted all involved parties, police, emergency services, and healthcare teams by providing real-time insight into the movement and health profiles of attendees across both the inner and outer zones of the concert venue. This was a perfect example of synergy between human expertise and technology.

Through the application, we were able to gather critical data: how many people were coming, where they were coming from, what mode of transportation they used, whether they had any medical conditions, and more.

Most importantly, the app provided a live heat map showing crowd movement before, during, and after the concert, which allowed us to respond quickly and effectively to any potential risk.

Analytics is unjustly overlooked, unlike close protection which is privileged and always seen front and center next to VIP individuals. Analysts are the ones doing the hardest job far from the public eye, they are the “eyes and ears” of close protection

Jurjević: Preparations begin as soon as we receive the first indication that such an event might take place. From that moment on, the entire system is elevated to a heightened state of readiness. Earlier I mentioned that analytics is often unjustly overlooked in the protection of state officials, then in the case of large-scale events, that role is played by logistics. At the concert you referenced, nearly 5,000 private security staff were engaged, along with more than 1,000 emergency service personnel and over 6,000 police officers. In total, we’re talking about 12,000 people working together over nearly 24 hours. Planning and preparation are vital, but it is logistics that plays the key role in “protecting those who protect us.”

For example, after recently organizing the world’s largest ticketed concert, we realized that some aspects could have been handled better. In practice, emergency services already work closely together on a daily basis, whether responding to criminal incidents or traffic accidents, police, emergency medical teams, and firefighters act as a unified force.

However, since we brought in additional teams from other cities for the concert, we later recognized that we had, unnecessarily, assigned police officers, emergency responders, and firefighters from the same city to different operational zones. Although the event was a complete success, there is always room for improvement and learning. n

Securing Vision 2030

INSIDE SAUDI ARABIA’S DOUBLE-DIGIT SECURITY AND SAFETY BOOM

Saudi Arabia’s security market is experiencing unprecedented transformation, driven by Vision 2030 mega-projects and advanced technologies. From smart city infrastructure to critical energy facilities, the Kingdom is rapidly adopting surveillance, access control, and fire safety systems. Industry executives reveal how this evolution is reshaping everything from mobile credentials to predictive safety systems

IN FOCUS

Saudi Arabia’s physical security market is accelerating rapidly, fueled by Vision 2030 and massive project investments. These forces are creating explosive demand for AI surveillance, biometrics, fire safety, and integrated command systems to safeguard critical infrastructure, enable smart cities, and support the Kingdom’s ambitious growth. To shed more light on this, industry leaders from Bosch Building Technologies, Tabbara Electronics, and HID reveal why security and safety have evolved from an operational necessity into a strategic pillar of Saudi Arabia’s economic transformation.

Security Market Set for Double-Digit Growth

Saudi Arabia’s physical security market, valued at USD 1.24B in 2024, is set to nearly double to USD 2.36B by 2031 (CAGR 9.6%), according to IMARC Group. Growth spans oil & gas, healthcare, real estate, and transport, with hardware leading, while software and services are rising through analytics and connectivity.

Sam Cherif, Director and Regional Business Head for Middle East and Africa at HID, emphasizes that “Saudi Arabia’s security market is one of the most dynamic in the world right now. Driven by Vision 2030, the Kingdom is making bold investments in digital transformation and infrastructure, and security is a fundamental part of that journey.”

Building on this context, Loubna Tabbara, Marketing and Sales Director at Tabbara Electronics, noted “The Saudi security market is expanding rapidly, driven by strong public and private sector investments. Growth is in the double digits annually, with the highest volumes in critical infrastructure, transportation hubs, energy facilities, and smart city initiatives, all areas where security and connectivity are fundamental to operations.”

Growth is underpinned by technology adoption, regulatory support, and rising demand across infrastructure and verticals. Vision 2030 programs grew by 33.8% in 2024, channeling investment into health, education, tourism, logistics,

industry, and renewables. A major contributor is the services segment, valued at USD 1.81 billion in 2025 and expanding 7.4% annually through manned guarding, consulting, and integrated operations.

Giga-Projects Transform Security

Saudi Arabia is leading the Middle East security market with strong double-digit growth, driven by government investments in critical infrastructure and smart city projects, alongside growth in the UAE. Frost & Sullivan projects commercial security to reach USD 10.2B and homeland security USD 34.2B by 2020, with fire safety also expanding sharply. Driven by mega-projects and rising threats, demand spans CCTV, access control, perimeter systems, and fire protection, while cloudbased surveillance and IT security for data centers gain traction.

Supported by the Public Investment Fund (PIF), Saudi Arabia’s megaprojects span energy, urban development, culture, housing, and healthcare. As Maan Ghannam, Regional Sales and Business Development Manager at Bosch Building Technologies, emphasized, “The Kingdom’s transformative Vision 2030, coupled with the unparalleled scale of Public Investment Fund (PIF) initiatives and giga-projects, has unleashed an extraordinary breadth of opportunities across virtually every trade and business sector in Saudi Arabia.”

Mega and giga-projects like NEOM, Red Sea Global, and Qiddiya are at the heart of Vision 2030. As Cherif explained, “Everywhere you look, from mega-projects like NEOM to the expansion of airports, hospitals, and financial services, there is a clear demand for smarter, more connected, and more secure solutions. This demand is set to propel the market at a compound annual growth rate (CAGR) of 9.1% to hit $3.4 billion by 2030.”

NEOM, Saudi Arabia’s flagship Vision 2030 giga-project in Tabuk Province, aims to redefine sustainable living, technology, and innovation, encompassing The Line, Trojena, and Oxagon. Reflecting on its scale and complexity, Tabbara notes that “Saudi Arabia is undertaking some of the most ambitious projects in the world, and security is central to them. At the forefront is NEOM and the other giga-projects, where advanced surveil-

The Saudi security market is expanding rapidly, driven by strong public and private sector investments

lance and communication systems are being integrated right from the planning stage.”

Red Sea Global, a PIF-backed developer founded in 2018, drives the Kingdom’s premier tourism initiatives, including The Red Sea, AMAALA, and Thuwal Private Retreat. Qiddiya, another PIF-backed giga-project, plays a unique role in achieving Vision 2030’s ambitions, with security embedded in its infrastructure and operations. Following this, New Murabba, launched in 2023, is a 19 sq. km mixed-use development in Riyadh. Designed for walkability and cultural integration, it is projected to add SAR 180 billion to non-oil GDP and create over 330,000 jobs by 2030, with advanced security systems integrated throughout the district.

SMEs and Investments Fuel Demand

SMEs, a key pillar of Vision 2030, now employ 7.8 million people, with women leading 45% of new registrations. Their growth in fintech, tourism, e-commerce, and manufacturing is driving demand for affordable, scalable security solutions like retail surveillance and integrated access control. Credit upgrades, strong PMI readings, and rising FDI are driving capital into technology, real estate, healthcare, and tourism, while giga-projects such as Expo 2030 strengthen investor confidence. This growth is also fueling demand for advanced physical security in ports, airports, and economic zones, protecting critical assets and reinforcing Saudi Arabia’s position as a safe and competitive trade hub.

Key

High-Growth Verticals in Saudi Arabia

As Saudi Arabia pursues its Vision 2030 goals, distinct sectors are driving unique security demands and technological adoption. From critical energy infrastructure to emerging smart cities, each vertical is reshaping the Kingdom’s security landscape.

The 2025 Security Services Sector Skills Council Report highlights a rapidly transforming industry driven by technology integration, ecosystem evolution, and service diversification. AI surveillance, biometrics, IoT, and cloud monitoring are boosting efficiency, while collaboration is fostering integrated cyber-physical platforms.

Security Supports Critical Energy Infrastructure

Saudi Arabia’s energy and utilities sector remains the backbone of the country’s economy. Rising consumption, growing electricity demand, and significant infrastructure

expansion highlight both its central role in development and its exposure to security risks. Commenting on this, Tabbara emphasized, “In the energy sector, whether oil and gas, utilities, or renewables, we see continuous prioritization of advanced command, control, and communication solutions to safeguard operational continuity and resilience. We also take pride in supporting Saudi Arabia’s defense and oil and gas sectors through our trusted partners, where we maintain strategic stock to ensure availability and continuity for these nationally important industries.”

Ghannam noted, “Closely following are the utilities sector, driven by a surging demand for power and energy, and a robust strategic push towards increasing renewable energy capacity.” This growth drives investor confidence, partnerships, and demand for robust security across critical infrastructure, from perimeter surveillance to access control, ensuring operational continuity in the Kingdom’s vital sectors.

Making Transport FutureReady

Saudi Arabia’s aviation sector, a key pillar of Vision 2030, is scaling to serve 300M+ passengers annually by 2030. AI is transforming safety, efficiency, and sustainability through predictive maintenance, traffic management, passenger services, and fuel optimization, despite regulatory and cost challenges. Tabbara noted, “Transportation and aviation are undergoing rapid modernization, with major investments in airports, metro systems, and logistics hubs.” This growth is fueling demand for advanced security—surveillance, access control, perimeter defense, and intrusion detection—where AI analytics enhance monitoring, anomaly detection, and compliance to protect infrastructure and support global connectivity. Ghannam concluded, “The aviation sector is undergoing massive investments to increase capacity dramatically. A prime example is the visionary King Salman International Airport, set to become one of the largest in the world.”

Proactive Security for Smart Cities with AI Systems

Smart city growth in Saudi Arabia is driven by the integration of IoT and AI, which links sensors, cameras, vehicles, and infrastructure into unified networks. Predictive analytics and machine learning improve traffic, energy use, and urban planning, while AI-enabled security systems provide

Regulatory Framework Strengthens Compliance

Saudi Arabia’s safety regulatory environment is evolving to support market growth, with authorities taking a proactive stance toward international alignment. Maan Ghannam, Regional Sales and Business Development Manager at Bosch Building Technologies emphasized the Kingdom’s regulatory approach: “From a regulatory standpoint, local authorities are exceptionally proactive, continuously updating standards to align with international best practices. Yet, this dynamic environment also maintains a pragmatic approach, with regulations designed to logically serve projects of all scales – from those requiring straightforward, compliant solutions to the most advanced.”

The regulatory landscape includes multiple oversight bodies: the Ministry of Human Resources and Social Development (HRSD) oversees occupational safety, the General Organization for Social Insurance (GOSI) provides safety standards, and Saudi Civil Defense manages fire safety regulations. The Kingdom is introducing updated fire and life safety regulations in 2025, which are expected to drive compliance-driven demand across all safety segments.

The scale and value of Saudi Arabia’s mega-projects are driving demand for the most advanced safety solutions. Ghannam noted: “However, the unprecedented investments and the sheer value of assets within many of the Kingdom’s ongoing mega-projects are driving a clear demand for cutting-edge solutions. It is within this context that the most prominent trend in life safety technology today is for products that are not only easy to install but also leverage AI-driven intelligence to offer superior reliability.”

proactive surveillance and access control. The result is intelligent ecosystems that enhance safety, efficiency, and resilience across urban environments.

Tabbara emphasized that “Beyond flagship projects, investments in smart cities and transportation modernization are accelerating the adoption of connected surveillance and unified communication platforms.” Saudi Arabia’s smart city drive, led by Riyadh, Madinah, Makkah, Jeddah, and Al-Khobar with SAR 500B in municipal investments, NEOM, and Quality of Life programs, uses IoT, AI, 5G, and data platforms to enhance mobility, utilities, health, and governance.

Safeguarding the Kingdom’s Leisure Economy

Tourism is another key pillar of Vision 2030, with goals to attract 150M visi-

tors annually by 2030, contribute 10% to GDP, and create 1M jobs. As Tawfeeq Alsadoon of Red Sea Global notes, achieving this requires robust security to safeguard infrastructure, natural assets, and visitor experiences. Saudi Arabia’s tourism boom, from AlUla to new entertainment and cultural hubs, demands advanced crowd management, emergency response, and discreet surveillance. Similarly, Saudi Arabia’s sports sector is set to grow to $22.4B by 2030, fueled by investments, global events, and Vision 2030. Having hosted 100+ events, including Formula 1 and the FIFA Club World Cup, the Kingdom will also host the 2034 FIFA World Cup. Ghannam noted, “Further, major commitments like Expo 2030 and the FIFA World Cup 2034 highlight this diversification, driving vast new requirements for advanced Life Safety systems.”

Technology Trends Shaping Security Market

Across Saudi Arabia’s security industry, transformative technologies are redefining traditional market segments. AI analytics, cloud integration, mobile credentials, and biometric authentication are not just enhancing existing solutions, but rather changing how surveillance, access control, and threat detection systems operate. The following analysis examines the key technological trends driving growth and innovation across core security segments in the Kingdom.

AI, IP, and Cloud Power Video Surveillance Market

Saudi Arabia’s video surveillance market, valued at USD 690.5 million in 2024, is projected to reach USD 2.09 billion by 2033, growing at a CAGR of 13.1%, according to IMARC Group. This rapid growth is driven by Vision 2030 mega-projects, smart city developments, and critical infrastructure expansion, creating strong demand for advanced, AI-enabled systems. Surveillance and analytics are becoming central to physical security as the Kingdom modernizes. Moving beyond traditional CCTV, AI-powered systems now deliver facial recognition, object detection, and behavioral analysis to enable proactive incident response. Tabbara noted, “On the surveillance side, Avigilon and Pelco platforms are in strong demand, particularly for their advanced AI analytics and open integration capabilities.” She added, “There is strong demand for AI-powered surveillance systems, not only traditional CCTV, but platforms with analytics such as facial and object recognition that allow operators to respond proactively.” There is also a marked shift from analog

to IP-based and wireless cameras, offering greater connectivity, flexibility, and scalability for smart city and infrastructure projects. Meanwhile, cloud-based surveillance solutions, including Video Surveillance as a Service (VSaaS), provide scalable, remoteaccess capabilities while ensuring compliance with data privacy regulations. Ghannam explained, “The current market landscape is characterized by an urgent need for pioneering ideas and inventive solutions, particularly those leveraging the power of artificial intelligence.” Building on this, Tabbara stated, “We are seeing a dynamic shift in how security technology is deployed. One of the strongest trends is the adoption of AI-driven video analytics, which allows operators to move beyond passive monitoring and anticipate risks with faster, data-driven decisions.”

As these technologies take hold, video surveillance in Saudi Arabia is becoming a strategic tool for safety, operational efficiency, and resilience. Leading players include Pelco, Avigilon, Axis Communications, Panasonic, Hikvision, Dahua Technology and Hanwha Techwin.

Access Control Growth Driven by Mobile, Open, and Sustainable Solutions

Saudi Arabia’s access control market is set to grow rapidly through 2028, fueled by rising security needs, flagship infrastructure projects, and the adoption of cloud-based systems. Valued at approximately USD

137 million in 2023, the market is forecast to reach around USD 242.9 million by 2030, growing at a CAGR of 8.59%, based on BlueWeave Consulting (2024).

According to Cherif, “A huge volume of investment in advanced access control, video surveillance, sophisticated biometrics, and integrated physical security systems for critical infrastructure.”

Building on this momentum, he highlighted how flagship developments are leading the way, saying, “It is also exciting to see how cutting-edge projects such as the Red Sea Project and AMAALA are also setting new benchmarks by adopting cutting-edge, technology-driven approaches to safety and access control.”

As the Kingdom advances its growth goals, three major trends are reshaping the access control landscape: the rapid rise of mobile access, the adoption of open and cybersecure platforms, and the growing demand for sustainable and ecofriendly credentials.

Mobile Access: From Plastic to Digital

Reflecting on market dynamics, Cherif explained, “What we see in Saudi Arabia is that demand is being shaped less by a single ‘top seller’ and more by a strong push for digital transformation. Organizations want solutions that are secure, seamless, and future-ready, and that is driving the rapid adoption of our mobile access technologies. Our HID Mobile Access®, for example, including the Employee Badge Integration with Apple Wallet, has been especially well received in the Kingdom.” HID Mobile Access replaces cards and keys with secure smartphone or smartwatch credentials, enabling tap-based entry while enhancing security through encryption, instant revocation, and optional MFA.

Open and Cybersecure Platforms

The push for open-architecture and cybersecure solutions is also reshaping access control in the Kingdom. HID’s Mercury MP

Vision 2030, coupled with the unparalleled scale of Public Investment Fund (PIF) initiatives and giga-projects, has unleashed an extraordinary breadth of opportunities
Loubna Tabbara, Marketing and Sales Director, Tabbara Electronics
Sam Cherif, Director and Regional Business Head for Middle East and Africa, HID
Maan Ghannam, Regional Sales and Business Development Manager, Bosch Building Technologies

Controller integrates IoT, automation, and third-party systems with advanced encryption, secure boot, and ARM TrustZone protection. Commenting on its regional impact, Cherif noted, “This past year, we introduced our new MP Controllers to the Saudi market, which are designed to deliver cybersecurity measures like vulnerability scanning, compliance-ready technology, and secure boot processes to businesses of all industries and sizes to ensure maximum protection.”

At the same time, the HID Aero Controller line is attracting interest as an openarchitecture platform offering a complete integration package. Cherif explained, “At the same time, we are seeing growing interest in our HID Aero Controller product line, which gives access control providers a complete and ready-to-use platform without the costs of building and maintaining their own hardware.”

Focus on Sustainable Credentials

The shift toward environmentally responsible security is evident in growing demand for HID’s Seos Bamboo Eco Card. This credential offers the same advanced Seos technology and security features as PVC cards but supports ESG commitments. Cherif noted, “Our Eco Card range is proving to be a great fit for organizations that are accelerating their sustainability journey, allowing them to enhance security while supporting their environmental commitments.”

By reducing carbon emissions by 75% compared to traditional PVC cards, Seos Bamboo Eco Cards allow Saudi organizations to strengthen security while advancing their sustainability goals.

Biometrics Enhance Security Across Sectors

Saudi Arabia’s biometrics market, valued at USD 394M in 2024 and set to reach USD 1.35B by 2033 (14.7% CAGR), is driven by mobile adoption of fingerprint, facial, iris, voice, and passwordless authentication for secure digital identity. Commenting on this momentum, Cherif noted, “From our perspective, IoT-enabled and automated technologies are enhancing real-time threat detection and response in high-traffic zones and critical infrastructure.”

Infrastructure initiatives like the Nafath national single sign-on platform, which processed over 3 billion verifications across 530+ entities by late 2024, highlight the scale of adoption. Reflecting on these trends, Cherif explained, “The market is

Proactive Security and Safety for Smart Cities with AI Systems

Smart city growth in Saudi Arabia is driven by the integration of IoT and AI, which links sensors, cameras, vehicles, and infrastructure into unified networks. Predictive analytics and machine learning improve traffic, energy use, and urban planning, while AI-enabled security systems provide proactive surveillance and access control. The result is intelligent ecosystems that enhance safety, efficiency, and resilience across urban environments.

Loubna Tabbara, Marketing and Sales Director at Tabbara Electronics emphasized that “Beyond flagship projects, investments in smart cities and transportation modernization are accelerating the adoption of connected surveillance and unified communication platforms.” Saudi Arabia’s smart city drive, led by Riyadh, Madinah, Makkah, Jeddah, and Al-Khobar with SAR 500B in municipal investments, NEOM, and Quality of Life programs, uses IoT, AI, 5G, and data platforms to enhance mobility, utilities, health, and governance. The scale and value of Saudi Arabia’s mega-projects are driving demand for the most advanced safety solutions. Ghannam noted: “However, the unprecedented investments and the sheer value of assets within many of the Kingdom’s ongoing mega-projects are driving a clear demand for cutting-edge solutions. It is within this context that the most prominent trend in life safety technology today is for products that are not only easy to install but also leverage AI-driven intelligence to offer superior reliability.”

increasingly expecting mobile credentials, which offer a secure, touchless way to access buildings and services using smartphones and wearables. Biometric authentication, from fingerprint to facial recognition, is also being increasingly deployed across various sectors, including government, banking, healthcare, and retail, for identity verification and access control.”

IDP Market Poised for Rapid Growth

The Saudi Arabia Intrusion Detection and Prevention (IDP) market generated USD 98.3 million in 2024 and is projected to nearly double to USD 192.7 million by 2030, growing at a CAGR of 12.3% (2025,2030). Rising security concerns,

digitalization, and demand for advanced cyber-physical protection drive growth. Solutions dominated with 65% of revenue in 2024, while services are set to grow fastest. Key technologies include NIDS, HIDS, NIPS, hybrid IDS, and HIPS, with applications across BFSI, government & defense, IT & telecom, healthcare, retail, and manufacturing. Major players include Cisco, Fortinet, IBM, Palo Alto Networks, Sophos, Bosch, and BAE Systems (Grand New Horizon, 2024).

Rising Threats Fuel Demand for Safety Technologies

While advanced security technologies safeguard critical assets, complementary safety systems ensure that people and operations are equally protected, reflecting

Saudi Arabia’s physical security market, valued at USD 1.24B in 2024, is set to nearly double to USD 2.36B by 2031

the Kingdom’s integrated approach to risk management

Saudi Arabia’s safety market is experiencing robust expansion across multiple segments, driven by Vision 2030 infrastructure projects, enhanced regulatory frameworks, and growing awareness of workplace safety standards. The convergence of traditional safety systems with IoT and smart technologies is transforming how organizations approach risk management and compliance.

Ghannam highlighted the strong performance of the Kingdom’s safety market, noting its resilience and alignment with national transformation goals. “Delving into our market analysis, we are witnessing exceptional growth figures within Life Safety across the Kingdom.” Drawing on his longstanding experience in the field, he further emphasized how Saudi Arabia’s evolving safety landscape is shaping demand for advanced technologies.

Ghannam added, “The construction sector has unequivocally emerged as the primary driver of demand for Life Safety solutions, which cuts across vertical segments and is not limited to transportation, critical infrastructure, commercial, residential, hospitality, office spaces, and sports infrastructure.”

Fire Safety is the Largest Segment

The fire safety sector represents the most substantial segment of Saudi Arabia’s safety market. The fire safety equipment market is projected to reach USD 1.067 billion by 2030, growing at 8.2% CAGR from 2024. This growth is supported by several specialized segments.

Fire suppression systems constitute a major component, with the market generating USD 213.1 million in 2024 and expected to reach USD 324.0 million by 2030, reflecting a 7.2% CAGR. Sprinklers dominate this segment as the largest revenue-generating product category. The broader fire suppression system market, valued at USD 612.0 million in 2023, is forecast to reach USD 1.017 billion by 2030 at 7.5% CAGR. Within the fire safety landscape, specialized sectors like data centers represent high-growth niches with unique requirements. Saudi Arabia’s data center fire detection and suppression market, valued at USD 56 million in 2023 and set to grow at 11.4% CAGR through 2029, is driven by digitization and the need for secure operations. Growth stems from AI-powered predictive monitoring, eco-friendly suppression agents, and multi-sensor detection

Traditional detector systems typically take around a minute to report a fire, but AI-powered cameras can detect and report incidents within seconds

systems, reflecting a focus on resilience, sustainability, and advanced safety in the Kingdom’s digital economy.

Workplace and Construction Safety Runs on Infrastructure-Driven Demand

The workplace safety market demonstrates the highest growth trajectory, valued at USD 504.6 million in 2024 and projected to reach USD 1.397 billion by 2030, representing an impressive 19.1% CAGR. This accelerated growth reflects heightened regulatory focus and Vision 2030’s emphasis on world-class safety standards.

Personal protective equipment (PPE) dominates this segment with 59.37% revenue share in 2024, followed by workplace safety services and safety equipment systems. The IoT-enabled segment accounts for the largest market share, driven by government mandates requiring smart safety solutions in construction and industrial zones under Vision 2030 and Saudi OSH regulations.

The construction safety equipment market, valued at USD 241.42 million in 2024, is forecast to reach USD 429.85 million by 2033, growing at 6.62% CAGR.

This growth aligns with Saudi Arabia’s massive infrastructure development under Vision 2030, including NEOM, Red Sea

Project, and numerous urban development initiatives that require comprehensive safety compliance.

Key Trends: Intelligent Detection, Scalable Panels, and Rapid Video

According to Bosch’s Ghannam, three key trends are currently reshaping life safety technology in Saudi Arabia. They are driven by demand for products that are not only easy to install but also leverage AI-driven intelligence for superior reliability. First, fast yet reliable detection is paramount. Advanced devices now integrate CO sensors for unparalleled accuracy, drastically minimizing false alarms and enabling detection directly at the source without relying on control panels. Seamless connectivity allows live reporting from anywhere, detailed analytics, AI-driven defect prediction, and self-testing capabilities.

Next, modular fire panels are becoming increasingly scalable and compliant, aligning with NFPA requirements and often exceeding them with advanced features. Whether a project requires a single loop or up to 32 loops, these panels, with robust networking capabilities, efficiently meet any project’s specifications.

Finally, video-based fire detection is revolutionizing response times. Traditional detector systems typically take around a

The current market landscape is characterized by an urgent need for pioneering ideas and inventive solutions, particularly those leveraging the power of artificial intelligence

minute to report a fire, but AI-powered cameras can detect and report incidents within seconds, without the need for additional software or hardware. This represents a monumental leap in speed and operational readiness, enhancing safety and resilience across facilities.

Regulatory Framework Strengthens Compliance

Saudi Arabia’s safety regulatory environment is evolving to support market growth, with authorities taking a proactive stance toward international alignment. Ghannam emphasized the Kingdom’s regulatory approach: “From a regulatory standpoint, local authorities are exceptionally proactive, continuously updating standards to align with international best practices. Yet, this dynamic environment also maintains a pragmatic approach, with regulations designed to logically serve projects of all scales – from those requiring straightforward, compliant solutions to the most advanced.”

The regulatory landscape includes multiple oversight bodies: the Ministry of Human Resources and Social Development (HRSD) oversees occupational safety, the General Organization for Social Insurance (GOSI) provides safety standards, and Saudi Civil Defense manages fire safety regulations. The Kingdom is introducing updated fire and life safety regulations in 2025, which are expected to drive compliance-driven demand across all safety segments.

The scale and value of Saudi Arabia’s megaprojects are driving demand for the most advanced safety solutions. Ghannam noted: “However, the unprecedented investments and the sheer value of assets within many of the Kingdom’s ongoing mega-projects are driving a clear demand for cutting-edge solutions. It is within this context that the most prominent trend in life safety technology today is for products that are not only easy to install but also leverage AI-driven intelligence to offer superior reliability.”

Secure Communications Support Emergency Response

Supporting these intelligent safety solutions is a robust communications backbone that ensures rapid coordination during emergencies. Technologies such as TETRA, DMR, LTE, wireless mesh networks, and broadband systems support emergency response. As digital infrastructure expands, these solutions are not only strengthening security but also enabling

There is strong demand for AI-powered surveillance systems, not only traditional CCTV, but platforms with analytics such as facial and object recognition

efficiency across oil and gas, transport, utilities, and hospitality sectors, making them central to the Kingdom’s transformation into a connected economy.

Building on this, Tabbara emphasized, “In the defense sector, we see strong demand for DMR solutions, which remain vital for tactical and secure operations.”

Tabbara further explained, “In the Saudi market, demand remains high for Motorola Solutions’ TETRA systems, particularly across the oil and gas sector where they continue to serve as the backbone of mission-critical voice and data communications.”

“Alongside this, secure two-way radio systems including TETRA, DMR, and LTE remain essential for mission-critical communications in environments where reliability is non-negotiable,” Tabbara emphasized. These robust communication networks not only ensure rapid emergency response but also exemplify how integrated technologies are forming the backbone of Saudi Arabia’s broader security ecosystem

Security as a Strategic Foundation

Saudi Arabia’s robust physical security and safety market growth reflects more

than market expansion: it demonstrates that advanced security infrastructure is fundamental to achieving the Kingdom’s transformation goals.

The convergence of mega-projects, regulatory evolution, and AI-driven technologies has created a unique ecosystem demanding both cutting-edge innovation and scalable reliability. From NEOM’s smart city infrastructure to traditional energy facilities, the Kingdom requires security solutions that adapt across diverse environments while maintaining world-class standards.

The integration of AI, IoT, and cloud technologies across all security segments signals a paradigm shift from reactive to predictive security models. This technological evolution, supported by robust regulatory frameworks and substantial investment, positions Saudi Arabia as both a regional leader and global testbed for next-generation security solutions.

As the Kingdom continues its transformation, the security and safety industry’s ability to deliver intelligent, scalable solutions will directly impact Vision 2030’s success, creating unprecedented opportunities for stakeholders to contribute to one of the world’s most dynamic economic transformations. n

Ras Al Khaimah | Conference & Exhibition

Transport

Hospitality

Banking

Healthcare

Smart

The Region’s Premier Security Conference and Exhibition. Join 3,000+ industry professionals, 100+ exhibitors, and global security leaders in Ras Al Khaimah, the UAE’s fastest-growing emirate and a rising hub for innovation, business, and world-class hospitality.

April 1 - 2, 2026

RAK EXPO CENTER

Ras Al Khaimah, UAE

Touchless by Design

THE RISE OF CONTACTLESS BIOMETRICS

Across banking, healthcare, and government, organizations are embracing contactless biometrics for faster, safer, and more convenient authentication. The touch-free revolution is reshaping how we prove who we are

PRODUCTS & SYSTEMS

The pandemic put contactless biometrics in the spotlight for all the wrong reasons, but it turned out to be exactly the right technology at the right time. This technology didn’t just solve a temporary problem: it proved it was the future of identity verification. Today, organizations aren’t choosing touchless solutions because they’re worried about germs. They’re choosing them because they work better. Thus, in this article, we’ll track the remarkable rise of contactless biometrics, from pandemic necessity to technological standard. We’ll explore how this shift transformed not just our approach to security, but our entire understanding of what contactless identity verification can look like in the modern world.

Rapid Expansion Across the MEA Region

To start, some key numbers highlight the sector’s expansion. Valued at USD 17.55 billion in 2024, the global market for contactless biometrics is projected to nearly triple to USD 46.65 billion by 2030, reflecting a strong annual growth rate of around 17 percent. In the Middle East, this sector is experiencing strong momentum as well, driven by strategic investments.

Across the broader Middle East & Africa (MEA) region, forecasts from Consainsights anticipate growth from USD 1.06 billion in 2023 to USD 4.68 billion by 2033. According to Grand View Research, the UAE market alone generated USD 407.2 million in 2024, pro-

jected to climb to USD 1,195.1 million by 2030. It is worth noting that the larger MEA region accounted for about 7 % of global contactless biometrics revenue in 2024. Adoption is being accelerated by government-led initiatives, particularly in the UAE and Saudi Arabia, with the focus on border security, airports, and digital ID systems.

How Biometric Companies Adapt Locally

While contactless biometrics adoption is a global phenomenon, regional strategies and local market understanding have proven crucial for sustainable growth. Suprema is one of the companies active in the regional market whose expansion in the Middle East demonstrates how strategic positioning can accelerate the adoption of this technology.

When Suprema launched its Middle East subsidiary, the company’s initial distribution-only model limited market penetration. Since then, the company has made significant strides.

“We had conducted a complete market gap analysis and the areas of improvement with an action plan, which was the beginning of Suprema Middle East’s success story,” explains Mohamed Shenawy, Managing Director at Suprema Middle East. The results followed suit. “The sales revenue has grown by 300% in seven years,” adds Shenawy. Based on these results, Suprema decided to expand, adding Africa, Turkey, and CIS countries to the original Middle East coverage. At the same time, Suprema has emphasized cloud-first innovation as a key driver of growth alongside growing its regional coverage. This approach represents

a shift away from traditional server-dependent access control systems. Today, Suprema’s solutions span diverse sectors, with a strong presence in government ministries, oil & gas, education, healthcare, banking, data centers, plants, and transportation hubs.

Other companies have also moved quickly to anticipate and address the shift toward contactless solutions in the region, each leveraging its unique strengths and technological heritage.

IDEMIA has positioned itself as a provider across the broad spectrum of modalities, including face, iris, and fingerprint analysis for both physical access and digital authentication. Their flagship MorphoWave solution exemplifies this comprehensive strategy, allowing users to scan and verify up to four fingerprints simultaneously in less than a second with a simple wave of the hand. The portfolio extends further with VisionPass for facial recognition and OneLook for iris solutions.

NEC is yet another company that has concentrated on strengthening its portfolio, with a focus on creating frictionless operational experiences while improving accuracy, speed, and resilience across diverse environments. These go from indoor offices all the way to large, dynamic public areas such as airports and smart city deployments. By embedding contactless authentication solutions across multiple domains, NEC aims to actively help organizations transition away from traditional card-based or PIN-dependent access methods.

ZKTeco has pursued an intensive investment strategy in both facial and palm recognition technologies, backed by substantial research and development resources. Their portfolio includes the SpeedFace, ProFaceX, and ProMA series, complemented by Armatura’s OmniAC30 multimodal terminals that integrate facial and palm recognition capabilities. Their palm recognition systems use advanced imaging to read multiple features of the hand, including prints, veins, and shape. This approach delivers robust anti-spoofing protection with false acceptance rates below 0.00001% and false rejection rates under 0.001%, demonstrating how technical innovation drives market confidence in contactless solutions.

Mohamed
Mohammed

PRODUCTS & SYSTEMS

The Rise of Facial, Iris, and Palm Recognition

While multiple biometric modalities are advancing rapidly, certain technologies are clearly emerging as market favorites. These are driven by their technical capa bilities, user acceptance, and adaptability across diverse deployment scenarios.

Facial recognition stands out as the most widely adopted contactless modality across virtually all types of deployments. “Facial recognition, delivered through our VisionPass solution, is seeing especially rapid growth,” explains Virginie Flam, SVP & Global Head of Smart Biometrics at IDEMIA Public Security, noting that their algorithms ranked first in the latest NIST FRTE evaluations.

The appeal of facial recognition extends beyond pure technical performance to encompass practical deployment consid erations that are crucial for real-world im plementations. As Flam notes, the ability to enroll remotely via smartphone makes this modality highly adaptable, which, in turn, creates deployment flexibility that drives adoption across diverse applica tions. These range from event ticket ing to residential access control and even payment systems.

NEC strives to reinforce this trend, particularly in the specific market segments. “Among contactless biometric modalities, facial rec ognition and iris recognition are currently gaining the most trac tion, particularly in high-traffic, security-sensitive environ ments”, the company states. Other biometric modalities are also successfully carv ing out significant market niches based on their unique technical strengths and spe cific application advantages.

For Iris ID, iris recognition remains central to their value proposition, particularly when strategi cally combined with facial recognition in multimodal deployments. “Iris is known for high accuracy and is less prone to false acceptance and less vulnerable to spoofing as compared to facial recognition,” explains Murad. While acknowledging that face recognition is better known and convenient for first-time enrollments, Murad believes that “fusion solutions will continue to gain momentum” as organizations seek to balance convenience with security requirements.

Palm recognition is also emerging as a particularly robust alternative for highsecurity applications where compromising on accuracy or spoofing resistance is not acceptable. According to Junais Ibrahim, Manager for Integrated Security Solutions at ZKTeco Middle East, the technical advantages of palm recognition extend beyond mere accuracy statistics. His company’s technology in this field relies on nearinfrared illumination to capture subsurface vascular patterns. This creates biometric templates that are inherently more difficult to spoof compared to surface-based modalities. In this manner, the multi-modal approach based on combining palmprint topography with palm-vein vascular mapping provides multiple layers of verification within a single

Yet, just as palm recognition leverages multi-layered verification for critical scenarios, facial recognition technologies are evolving with similar antispoofing sophistication to meet diverse

Suprema, for instance, has prioritized facial recognition devices with advanced anti-spoofing capabilities while maintaining the flexibility needed to address varying regional preferences. The company’s BioStation 3 has been described as their “best revenue-generating product” in the region. It incorporates both infrared and RGB cameras in a dual-sensor approach that ensures accurate authentication. This is enhanced by Suprema’s AI algorithms developed by their in-house team, which undergo testing and training using

Multimodal Biometric

Multimodal solutions have also drawn the attention of Iris ID, a company that has built upon its decades-long legacy in iris recognition. Their approach combines what Mohammed Murad, Chief Revenue Officer at Iris ID Systems, describes as “the most accurate biometric, iris, without the most convenient one, face.” This helped them create solutions that leverage the strengths of both modalities. Recent innovations from Iris ID include hardware and software solutions that facilitate efficient immigration and border crossings, access control for critical infrastructures, and workplace management solutions that keep law enforcement officers safe while on duty. This development trend shows how companies can extend their core competencies to address emerging security challenges.

various challenge models, including printed photos and video captures.

One of its more recent products is BioStar Air, which was launched in 2025 as a fully cloud-based, mobile-first platform. The aim was to move away from serverbased, card-dependent infrastructure toward more flexible, scalable deployment models. This platform represents the convergence of advanced biometric technology with the existing cloud architecture, enabling organizations to implement sophisticated access control without traditional infrastructure investments.

Regional Adoption Trends Fueled by Security, User Experience, and Regulation

These capabilities not only reflect technological innovation but also align with broader market trends, where regional organizations are increasingly driven to adopt contactless solutions by security needs, user expectations, and regulatory pressures.

Quite predictably, security stands as the primary driver, but not in the traditional sense of simply preventing unauthorized access through basic authentication. “The key driver is the need for stronger security, delivered through a frictionless journey that connects secure physical access with seamless digital identity experiences,” explains Flam. Advances in AI have also significantly sharpened fraud detection capabilities and strengthened spoof resistance. This provides institutions with the confidence they need as fraud levels continue rising globally across all sectors. The economic dimension of security concerns adds another layer of urgency for the decision-makers. “As the cost of fraud

climbs, biometric authentication is proving to be both a stronger shield and smarter investment,” adds Flam. All of this is making the business case for contactless biometrics increasingly compelling from a financial risk management perspective. The demand for frictionless user experiences represents the second major driver, as organizations need to approach the balance between security and convenience more flexibly. “Employees, customers, and travelers expect to move without cards, PINs, or passwords,” notes Flam, adding that this expectation shift has created a new baseline for acceptable user experience. As a result, convenience is not just desirable but essential for user adoption and

operational efficiency across diverse applications. In other words, from workplace access to payments and boarding gates, contactless verification delivers speed and simplicity, boosting satisfaction, adoption, and overall operational efficiency.

Speaking of operations, it is clear why driving their efficiency at scale represents the third major driving force, particularly for high-traffic environments. “Airports, stadiums, financial centers, and other high-traffic environments need to move thousands of people quickly and securely. Biometrics remove bottlenecks and enable systems that are both faster and more resilient,” says Flam.

Similarly, for NEC, the efficiency benefits of contactless biometrics are designed to minimize physical interaction, reduce these bottlenecks in high-traffic areas, and improve the overall user experience. This improvement has direct measurable business benefits, including reduced wait times, improved customer satisfaction, and enhanced operational capacity. Looking beyond the lenses of efficiency, Iris ID identifies increasing cyber and

The pandemic put contactless biometrics in the spotlight for all the wrong reasons, but it turned out to be exactly the right technology at the right time

physical security threats as key motivators, alongside the growing deployment of biometrics in critical sectors including travel, healthcare, and finance. “Whether it is due to cyber-attacks or actual physical breaches, we are seeing an increase in these activities that are putting people’s Personal Identifiable Information (PII) as well as sensitive corporate information at risk,” explains Murad. This threat landscape evolution makes advanced authentication not just preferable but necessary for organizational survival. Less obvious but no less strong driving force is the regulatory pressure, which, according to Ibrahim, includes “increased hygiene awareness post-pandemic, stronger demand for secure yet frictionless access, rapid digital transformation across industries, and government regulations encouraging higher authentication standards.” These regulatory frameworks also promote the use of privacy-by-design features like decentralized storage and irreversible biometric templates, making adoption necessary rather than optional in many sectors.

Subscription and Cloud Models Transform Biometric Access

As these drivers are reshaping how the solutions are deployed, various cloud-

The global market for contactless biometrics is projected to nearly triple by 2030

based and subscription models have emerged in response to the needs of organizations that seek flexibility and scalability.

The evolution toward flexible deployment models reflects both the industry’s growing maturity in understanding diverse customer needs across different organizational sizes, technical capabilities, and operational requirements. The majority of providers now offer various implementation approaches, ranging from traditional on-premises systems to fully cloud-based, subscription-style services that can be deployed rapidly with minimal technical overhead.

IDEMIA articulates the industry’s increasingly flexible approach to deployment. “Some clients prefer traditional on-premises systems, while others are moving toward cloud-based or subscription-style models. For organizations looking to minimize upfront investment, we can structure solutions in a service or subscription format. For others, a more conventional licensing model may be the right fit,” explains Flam. This customization capability allows organizations to optimize their investment approach based on capital

allocation strategies and operational requirements.

Cloud-first solutions are gaining traction across the industry as organizations seek to reduce infrastructure complexity while maintaining scalable performance. With this purpose in mind, Iris ID has launched iTMS Cloud, creating a platform that enables real-time workforce management data to flow seamlessly into existing HR systems. The company is also developing a subscription-based model for the time & attendance market that will allow partners to access the iT100 and iT100-AMP models on a subscription basis, providing operational flexibility at more predictable costs. Iris ID maintains support for organizations with a focus on specific data governance requirements. “For a high security community of customers, we continue to support on-premises solutions for organizations with strict data governance requirements, such as GDPR compliance,” says Murad.

NEC also leverages its cloud infrastructure through Identity Cloud Service and NeoFace Cloud, hosted on Microsoft Azure, to provide subscription-ready

PRODUCTS & SYSTEMS

Cloud-First Deployment Philosophy

Suprema’s BioStar Air represents a prime example of the cloud-first deployment philosophy, completely eliminating the need for on-premises servers. The platform enables devices to connect directly to the cloud infrastructure, supporting pure cloud-to-cloud server-level integration with the help of standard REST APIs. The architecture simplifies deployment by eliminating the need for servers or software installation. Sites can be brought online within minutes and fully configured in about an hour, according to Shenawy.

The platform also offers GDPR-compliant privacy protection through Templateon-Mobile technology, which stores biometric templates directly on user devices rather than in centralized databases. This approach addresses privacy concerns while maintaining authentication performance and system reliability.

biometric verification services. This approach is designed to deliver ease of deployment and cost-effectiveness, allowing clients to access facial and iris recognition capabilities while minimizing operational overhead. The cloud-based approach also supports additional benefits, including remote monitoring, real-time updates, and integration with existing enterprise systems.

Their competitor ZKTeco opted for a dual-track approach with its BioTime Cloud platform, which provides cloudbased and subscription-ready options. “Biometrics-as-a-Service enables organizations to scale easily, optimize costs, and integrate seamlessly with third-party applications”, says Ibrahim. Through

Armatura, ZKTeco also offers BioCode, representing a new approach to decentralized biometric deployment. This solution stores encrypted templates on users’ devices while generating dynamic QR codes for secure access authentication. The decentralized architecture reduces central server vulnerabilities while enhancing user privacy through local data control.

The technical sophistication of these deployment models reflects broader industry trends toward edge computing and distributed authentication. Organizations can now choose from hybrid on-premises and cloud options that address data protection requirements while maintaining the scalability and

operational benefits of cloud-based services. This flexibility may prove essential for organizations operating across multiple regulatory environments or managing varying security requirements across different facilities.

From Banking to Data Centers: Sectoral Biometric Adoption

Different industry sectors are adopting contactless biometrics at varying rates and scales, driven by their specific security requirements, regulatory environments, operational constraints, and user experience priorities. The adoption patterns reveal sector-specific considerations that influence technology selection and deployment approaches.

Banking and finance have emerged as leading adopters, driven by both security imperatives and evolving customer experience expectations. “Banking is leading the way, with biometrics replacing cards and passwords across mobile apps, ATMs, and in-branch services,” explains Flam. The financial sector’s adoption encompasses both customer-facing and internal applications, with biometrics enhancing security while streamlining user experiences. Additionally, these implementations strengthen employee traceability and reduce insider fraud risks.

PRODUCTS & SYSTEMS

The financial sector’s embrace of contactless biometrics extends to specialized applications that demonstrate the technology’s versatility. Ibrahim highlights palm-based ATM access systems with extremely low false acceptance rates, providing banking institutions with highly secure alternatives to traditional cardbased transactions while maintaining user convenience. Airports and aviation represent perhaps the most visible and strategically important deployment vertical, often serving as proving grounds for large-scale contactless biometric implementations.

For example, NEC powers Star Alliance Biometrics at Frankfurt and Munich airports, demonstrating how biometric systems can handle massive passenger volumes while improving operational efficiency. IDEMIA’s technologies are also deployed across airports, stadiums, and corporate offices worldwide, showcasing the scalability and reliability needed for high-traffic environments.

In the government sector, Iris ID supports nationwide immigration processing through Qatar’s Ministry of Interior, handling the complex security and throughput requirements of border control operations. This deployment manages large volumes of travelers while maintaining the accuracy and security standards essential for national security

Facial recognition stands out as the most widely adopted contactless modality across virtually all types of deployments

applications. The system’s integration with existing immigration infrastructure demonstrates the maturity of biometric technology for critical government operations.

Healthcare has also emerged as a critical vertical where institutions must balance multiple priorities, including hygiene requirements, regulatory compliance, and patient data protection. The sector’s adoption addresses stringent patient data protection requirements while ensuring secure access to both physical facilities and digital records. Healthcare implementations often require integration with existing hospital information systems and compliance with regulations like HIPAA, making deployment complexity a key consideration.

Corporate security represents a rapidly growing adoption area, particularly as hybrid work models create new authentication challenges that traditional badge-based systems cannot adequately address. Organizations are implementing biometric systems to secure both physical facility access and remote system authentication, often integrating these

capabilities with existing HR systems for workforce management.

The regionally relevant oil and gas sector has industry-specific requirements that drive biometric adoption. These facilities require robust authentication systems that can operate reliably in challenging environmental conditions while maintaining strict security protocols. Also, construction sites mushrooming across the ME region represent another specialized application where traditional card-based systems face practical challenges due to harsh working conditions and the temporary nature of worker assignments.

Finally, one of the more recent rising star customers for contactless biometrics is data centers. They increasingly represent high-security applications where biometric authentication provides essential protection for critical infrastructure while enabling efficient access for authorized technical personnel. These deployments often require integration with existing security systems and compliance with industry-specific regulations and standards.

Cultural and Regional Realities Sustaining Fingerprint Biometrics

Cultural and regional factors also ensure continued fingerprint relevance in specific markets and applications. “In contexts where cultural factors make other biometrics less practical, fingerprint continues to be the preferred option”, Flam explains.

ZKTeco’s Ibrahim elaborates on this point: “Fingerprint biometrics remain costeffective and widely adopted, especially in scenarios where alternatives may not be feasible. Also, in the Middle East market, cultural or religious reasons—such as women covering their faces—may necessitate fingerprint use.”

This cultural sensitivity consideration is crucial for regional deployments, where technical superiority alone cannot determine adoption success. Religious practices, cultural preferences, and local regulations may require alternative authentication methods regardless of the technical capabilities of contactless solutions.

Why Balancing Contactless and Traditional Biometrics Remains Relevant

While these deployments showcase the power of contactless modalities, fingerprint technology continues to evolve and retain relevance in specific contexts. Actually, in the region of the Middle East, simple replacement or overnight elimination of fingerprint biometrics is currently not an option. The more realistic path is measured adaptation and strategic inte-

gration, characterized by coexistence and complementary deployment of various modalities.

At IDEMIA, they feel that the pragmatic approach is the best one when it comes to fingerprint longevity. According to Flam, “traditional fingerprint biometrics will continue to play an important role in physical and logical access control in the future.” The reasons for it are simple: user familiarity and special applications give it staying power in applications where traceability and cost-effectiveness are primary concerns, such

as at small manufacturing sites and jewelry stores where the user population may be smaller.

Beyond commercial applications, fingerprint identification is also likely to remain mandatory in various government and police applications where established protocols, legal requirements, and integration with existing criminal justice systems make alternative modalities less practical.

Multi-factor authentication (MFA) is also recognized as a key driver of the coexistence of contactless and traditional biometric models. “Traditional biometrics such as fingerprints will increasingly coexist with other modalities in a layered security approach”, says Murad, adding that “the core objective of MFA is to make stealing personally identifiable information (PII) as difficult as possible, discouraging criminal attempts.”

Delivering synergy instead of competition is how NEC sees a coexistence model with older biometric workhorses. In this case, contactless solutions can handle mass authentication, while fingerprints remain a critical tool in high-security and specialized scenarios. Based on the concept of the “division of labor”, this operational specialization will make practical sense for organizations managing diverse security requirements across multiple facilities.

PRODUCTS & SYSTEMS

Embedding Security and Compliance into Biometric Design

As modalities coexist and adapt, the question of privacy and trust becomes central, with providers embedding stronger safeguards into every layer of design. Manufacturers increasingly understand that privacy protection begins with fundamental system design principles that

embed protection mechanisms at the hardware level. IDEMIA’s approach, for instance, extends beyond data encryption to encompass comprehensive lifecycle protection. “Our commitment extends throughout the entire data lifecycle, where we apply GDPR principles to make privacy an intrinsic part of system design and operation”, says Flam.

The technical foundation of this privacyby-design approach relies on advanced

cryptographic methods. This approach recognizes that privacy protection must be integral to system architecture rather than an add-on feature. “Presentation Attack Detection is a must for any modern biometric system. Moreover, all our solutions are built on algorithms that meet ISO 30107-3 compliance, and have undergone thorough testing by the iBeta laboratory, ensuring reliability, accuracy, and trust,” says Flam. These third-party validations provide independent verification of security claims and enable organizations to make informed procurement decisions based on standard metrics.

For their approach to the issue of privacy and trust, Iris ID emphasizes user consent and data encryption. “Use of the system requires an explicit opt-in enrollment process by each user. All biometric data captured during enrollment is immediately encrypted and cannot be reversed or decoded into its original image of an eye. We do not collect, retain, or store biometric data belonging to the end users. Data ownership and control remain with the deploying organization,” says Murad.

In this high-stakes game, ZKTeco plays the card of a focused compliance approach, noting that its technologies comply with privacy acts in major regions, including GDPR, CCPA, BIPA, and others. “All our biometric technologies use templates derived from fragments of biometric features, rather than original images. Our solutions incorporate infrared, lidar, video analytics, and 3D structured light facial recognition”, explains Ibrahim. Taken together, these approaches demonstrate that privacy, security, and trust are no longer optional add-ons but core pillars of contactless biometric systems. By combining robust technical safeguards, regulatory compliance, and user-centric data control, the industry is creating solutions that organizations can deploy with confidence while respecting individual privacy.

System Integration: Making Biometrics Work

While biometric technology companies focus on developing advanced authentication capabilities, the practical success of contactless biometrics often depends on seamless integration with existing access control infrastructure. Josh Baker, Product Manager for Integrations at ICT, provides insights into the integration per-

Credits: NEC Corporation

spective that complements the technology provider’s viewpoints.

ICT utilizes APIs and SDKs provided by integration partners to incorporate biometric readers into its Enterprise Access Control Platform, Protege GX. The integration encompasses device management, user enrollment, and user synchronization based on access requirements, all handled within the central platform. “Challenges with biometric integrations are typically device-related, incorrect programming of the devices, firmware version compatibility, or connection issues,” Baker explains. However, he notes that “the integrations themselves are straightforward,” with ICT providing detailed application notes and 24/7 technical support to address implementation issues. From an integration perspective, the benefits extend beyond enhanced security to encompass centralized credential management and environmental considerations. “For ICT, integrating biometrics with our access control allows a centralized management of users; biometric credentials become tracked as any other credential and can be reported on easily,” says Baker.

The environmental impact proves particularly significant in high-turnover environments. “There are environmental and practical benefits to using biometrics, especially in applications with high turnover

Banking is leading the way, with biometrics replacing cards and passwords across mobile apps, ATMs, and in-branch services

of users, such as education or hospitals. It avoids printing hundreds or thousands of cards, which will be thrown away after a year or so,” adds Baker. ICT’s higher education deployment demonstrates the dual-purpose potential of contactless biometrics. Students use facial recognition not only for secure facility access but also for automatic attendance recording, creating better security and operational efficiency through a single system that eliminates manual processes while enhancing access control.

This integration perspective highlights how the success of contactless biometric deployments depends not only on the quality of the biometric technology itself, but on the sophistication of the platforms that integrate these capabilities into comprehensive security and operational management systems.

The Seamless Future

The first stage of the contactless biometric revolution is complete. What began as a pandemic necessity has evolved into the new standard for identity verification.

Thus, today’s organizations aren’t simply replacing old systems but rather reimagining what authentication can mean for them and their customers. Deploying the right modality for each specific need is essential: facial recognition delivers convenience, iris scanning provides unmatched security, and palm recognition offers precision where it matters most.

Also, the shift toward cloud-first, subscription-based models has democratized access to sophisticated authentication technologies. This allowed organizations of all sizes to implement enterprise-grade security without massive upfront investments. At the same time, privacy-by-design principles ensure that enhanced security doesn’t come at the cost of user trust.

The Middle East and Africa region exemplifies this transformation, where cultural sensitivity and technological innovation converge to create deployment strategies that respect local preferences while meeting global security standards. There and beyond, the future of contactless identity verification seems clear enough: it is frictionless, intelligent, and increasingly indispensable. n

TRAKA AT INTERSEC

FUTURE OF KEY AND ASSET MANAGEMENT

As Middle East businesses grow, Traka’s smart key cabinets and asset lockers secure keys and devices, streamline operations, and integrate with existing systems, delivering efficiency and peace of mind

As economic development continues across the Middle East, more companies are establishing or expanding their physical footprint. Commercial construction alone is projected to surpass $400 billion by the end of the decade. With this growth, organizations must not only ensure smooth operations today but also remain flexible enough to adapt to tomorrow’s challenges. Yet, many companies overlook technology in some critical areas of their operations. This is especially true in the management of keys and equipment — a critical area where technology has consistently demonstrated its impact and clear return on investment.

Rethinking Key Management in the Digital Age

Despite advances in access control, physical keys remain essential across industries as both a primary tool and a backup. Many companies still manage them poorly, leaving keys in drawers or on pegboards and logging transactions inconsistently. This creates risks of loss or theft, with little accountability, and managers may not know a key is missing or who last used it for days or weeks. The result is a major security risk if the key falls into the wrong hands, and a costly liability if an entire facility needs to be rekeyed. Operations can grind to a halt while waiting to restore access. Traka’s Touch Pro intelligent key cabinets are a game-changer for key management. They store keys securely in one location, each attached to an electronic key fob that connects to the cabinet. Managers can assign access based on employee roles, reducing the chance of unauthorised handling. Employees access the cabinet using their badge, PIN code, or biometrics. Every transaction is automatically logged, producing detailed audit reports on demand. If a key isn’t returned on time, managers receive an instant alert, cutting down on wasted hours searching for it. For larger organizations, multiple cabinets can be deployed across facilities, eliminating the need for staff to travel long distances just to collect a key. The result: streamlined operations, accountability, and full visibility across sites.

Traka Lockers Streamline Device Security

The same benefits apply to Traka’s asset management lockers, which will also be on display at Intersec. These lockers store and charge shared devices like laptops, tablets, radios, and scanners — all critical for day-to-day operations. Through a feature called First In, First Out, devices that have charged the longest are issued first, ensuring staff always receive assets with full power. Employees can also report faults directly at the locker, removing defective devices from circulation until fixed. Just like with keys, if a device isn’t returned on time, managers know exactly who last checked it out. This approach extends the life of assets, reduces replacement costs, and ensures staff always have working tools on hand.

The real strength of Traka’s solutions lies in integration. Key cabinets and lockers connect seamlessly with existing access control systems. This avoids the need for employees to learn a new standalone platform — a common barrier to adoption. Instead, Traka works as part of the wider security ecosystem. With integrations into leading platforms like Lenel, Siemens, Gallagher, Software House, and others within the ASSA ABLOY family, Traka enhances existing networks rather than replacing them.

Traka’s intelligent cabinets and lockers represent the future of secure operations. They save time, reduce costs, and scale easily to meet future demands. Physical keys will continue to play a vital role in access control, while shared devices become ever more important in industries like logistics and hospitality. n

Traka was born from the need to help a major airline manage and track keys for its airside ground vehicles. Today, after three decades, our intelligent solutions empower companies to secure, manage, and audit access to critical assets in 25+ industries. With our global reach and local expertise, we provide the security, efficiency, and accountability you need to protect what matters most.

Find out about our smart key and equipment management solutions at traka.com

PURPOSE-BUILT BIOMETRIC SECURITY

WHY DATA CENTERS ARE TURNING TO IRIS RECOGNITION

Faced with rising cyber and physical threats, data centers are increasingly adopting biometric solutions. Among them, iris recognition technology is gaining traction as a way to strengthen access control while supporting efficient operations

Growing cybersecurity and physical security risks are pushing data centers to adopt layered approaches to protection. As the hub of an organization’s operations, data centers have evolved over the years to exist not just as physical sites but also in the cloud. Sensitive information stored on these connected servers demands the highest level of protection. To meet this need, organizations that include Fortune 100 companies and CERN, a European nuclear research facility, are increasingly turning to Iris ID’s technology to secure their physical data center locations.

Why Iris Technology?

The foremost reason for implementing a biometric solution for data center access management is to ensure that only the people with approved credentials get in and/or out of the location. Aside from DNA, iris recognition is the most accurate authentication solution on the market. It is also fast and noncontact.The scalability of the solution and capability to work with existing access control solutions providing Wiegand and OSDP communication make it a chosen leader in the global market.

Iris recognition is the most accurate authentication solution on the market, more inclusive than other non-contact technologies, can be used in extreme weather conditions, and it satisfies GDPR regulations

In addition to being the most accurate, reliable, and fastest non-contact biometric on the market, iris recognition technology satisfies GDPR regulations. GDPR compliance is crucial for global companies, as fines for non-compliance are steep, reaching up to 4% of an organization’s global revenue. GDPR requires that indivi-

duals have a right to know how their optin data is being used and stored, and - if requested - the company managing the data must delete it.

In order for iris recognition to be used in an integrated access control management system, the user must agree to have their irises scanned and stored on

For data centers seeking stronger access control, iris recognition brings several practical advantages

a template. This acknowledgement satisfies the opt-in requirement put in place by GDPR. The stored images are then converted into a 512-byte digital template, ensuring maximum protection for the user, as no sensitive or personal identifiable information can be extracted. Iris technology is also more inclusive than other non-contact technologies; it can be used in extreme weather conditions as well as with users wearing goggles, hard hats, lab suits, and religious garb. Also, it is not affected by weight gain and will produce accurate results regardless of race or gender.

Benefits for the Clients

When developing a concrete plan for data center security, several factors must be taken into consideration, including physical security and technology. Iris ID’s solutions mesh well with the preferred layered security approach, allowing organizations

to combine multiple technologies. This provides strong protection on the data center floor while applying varying levels of security to other departments. Additionally, not everyone has the same level of access privilege, so Iris ID’s solutions allow organizations to assign and manage different levels of access accordingly. Also, these solutions are used because they deliver a robust standard of secure protection and allow data centers and colocations to stay ahead of potential threats in a rapidly changing technological environment.

For data centers seeking stronger access control, iris recognition brings several practical advantages. The technology offers an easy, non-intrusive, and contactless user experience, while also supporting integration with optional thirdparty surveillance cameras. It can be deployed on top of existing infrastructure, managed remotely, and maintained with relative ease. Combined with round-the-

clock security, these features make it a compelling option for operators looking to enhance both protection and efficiency.

Measuring the ROI of Biometric Access

The benefits and ROI of using biometric monitoring in data centers are manifold. From time savings to increased security and efficiency, many organizations - not just data centers - are implementing biometrics into their security mix because it offers the best means to fight against costly physical and cyber security threats. First, biometric access control is reliable and will only allow those with the proper credentials in and out of controlled areas. The system cannot be hacked or compromised and requires users to be present on-site for access to be granted - remote access is prohibited. Next, iris technology and Iris ID products offer the ability to work with MFA solutions such as pins, cards, and other biometrics, such as face. This offers an added layer of protection and customization to accommodate varying levels of security. Finally, there is a benefit of low operational costs. Once the biometric access control system is installed, software and system updates can be carried out automatically, reducing overhead and IT workload so teams can focus on more critical support work.

The Value of Iris ID Technology

Iris ID technology securely restricts access to sensitive areas and information while eliminating the need for keycards or password sharing. It integrates with existing access control systems and works with multifactor authentication solutions, making it adaptable to different security setups. The system is easy to manage on an individual user basis and provides a solution that complies with both federal and global requirements. With a one-time, lifetime enrollment model and no recurring costs, Iris ID is supported by more than 25 years of access control expertise. n

ADVANCED RETURNS TO INTERSEC SAUDI ARABIA

SHAPING THE FUTURE OF FIRE SAFETY IN THE MIDDLE EAST

From 29th September to 1st October, fire industry professionals will gather at the Riyadh International Convention & Exhibition Center for Intersec Saudi Arabia 2025. Visitors to Stand 5-D36 will discover how Advanced is helping shape the future of fire safety across the Middle East and beyond, with its UL 864-approved Axis AX system, nextgeneration Axis EN panels and a wide range of solutions for smoke control, extinguishing, redundancy and more

n By: Shadi Elhag, Business Development Manager – Middle East, Advanced E-mail: selhag@advancedco.com

The Saudi market continues to see an increase in demand for ULlisted fire safety systems, particularly for large-scale, mission-critical and high-rise residential developments. The Axis AX system is uniquely positioned to meet these challenges, combining high performance, extensive configuration capabilities and powerful networking options into a single, versatile UL 864 10th editionapproved platform.

At its core, Axis AX is built for scalability. Whether you’re installing a simple twopanel network or a 200-node system, Axis AX delivers fast, reliable communication, advanced cause-and-effect programming and intuitive setup. Available in red or grey enclosures, it can be tailored to a wide variety of building aesthetics, from landmark developments and transport hubs to commercial towers and government facilities.

Critically, Axis AX has become a go-to solution for buildings where voice evacuation is essential. Integrated audio capabilities offer both pre-recorded and live paging features, while support for multiple channels ensures clear delivery of evacuation, alert and paging messages. In tall buildings where fire brigade

access is limited, this built-in autonomy can be life-saving.

Clarity and Coordination in Emergencies

To ensure synchronised messaging across complex Axis AX networks, PerfectSync technology guarantees that strobes and audio alerts remain coordinated, even across hundreds of panels. This eliminates the risk of mixed or

overlapping messages, which can cause confusion during emergency evacuations. The system also includes optional integration with a fire and emergency telephone system, allowing users to plug field telephones directly into Axis AX panels. This feature enables clear, reliable communication between floors and control centres, especially useful in large vertical environments such as hotels and residential towers.

EN Solutions for Evolving Needs

While UL systems are in strong demand, Saudi Arabia remains a rare market where both EN and UL fire systems are frequently deployed. For those specifying to EN standards, Advanced’s newly enhanced Axis EN system brings powerful new features designed to improve performance, configuration and sustainability. Axis EN’s eight-times faster processor, enhanced configuration options and improved power supply efficiency allow for quicker, more responsive fire system performance, perfect for installations that demand precision and flexibility. Combining an EN54 Parts 2 and 4-approved panel with a comprehensive suite of wired and wireless devices, Axis EN is well-suited to everything from education campuses to airports and hospitals. It also supports hybrid configurations, enabling a mix of wired and wireless detectors and peripherals, a particularly attractive option for retrofitting historic or fully operational buildings where cabling would be disruptive. As wireless fire alarm adoption continues to rise in the region, Axis EN’s compatibility with robust mesh wireless devices ensures installers have the flexibility they need.

Protection Beyond Detection

As part of its presence at Intersec Saudi Arabia, Advanced will also be showcasing a range of complementary fire protection technologies designed to work seamlessly with its core detection and control systems.

For smoke control, DynamixSmoke provides a highly visual, easy-to-program solution for configuring fans, dampers, stairwell pressurisation and more, especially useful in complex, multi-compartment buildings. Its intuitive grid-based interface simplifies cause-and-effect programming while supporting post-alarm purging, interlocks and automatic testing. Where continuous protection is critical, redundant control panels provide assurance that systems will remain operational even during faults, offering an added

layer of resilience for mission-critical facilities such as data centres and energy infrastructure.

In high-risk areas where fire suppression is required, ExGo delivers a dependable gas extinguishing solution with approvals to EN12094-1 and EN54 Parts 2, 4 and 13. Suitable for most single-flooding zone applications, ExGo is ideal for protecting valuable assets while eliminating the risk of water damage.

Addressing the Challenge of False Alarms One of the most frequently discussed issues in the Saudi market is false fire alarms. These events can cause costly downtime, reputational harm and in the worst cases, undermine public trust in fire protection systems.

Advanced’s Axis EN system offers powerful tools for unwanted alarm reduction. Central to this is AlarmCalm advanced false alarm management software that enables easy configuration of investigation delays and verification logic using customisable ‘building areas’. This allows separate strategies to be applied to different types of rooms, for instance, treating a hotel’s kitchen differently from its guest rooms or conference suites.

Systems for Every Scale

Not every project demands a multi-node network. For smaller sites where space, cost and simplicity are a priority, AxisGo offers the best of the Axis EN platform

in a single-loop, non-networkable panel. Fast to fit and intuitive to program using Advanced’s latest ConfigTool, it’s an ideal solution for small businesses, standalone retail outlets or temporary buildings.

For those working on conventional systems, QuickZone continues to deliver reliable fire protection across up to 32 zones. It’s quick to install and maintain and offers both standard and XL formats approved to EN54 Parts 2 and 4.

Partnering for Progress

As Saudi Arabia continues its rapid development across sectors including healthcare, education, hospitality and transportation, the need for intelligent, adaptable fire protection is growing. Advanced works with an expanding network of regional distribution partners and is actively seeking new collaborations in the Kingdom. By combining world-class fire safety engineering with ongoing investment in performance, usability and sustainability, Advanced is proud to support Saudi Arabia’s fire protection goals across UL and EN projects of every size.

Visit Stand 5-D36 at Intersec Saudi Arabia 2025, taking place from September 29th to October 1st at RICEC, to explore Advanced’s full range of fire protection solutions and meet its team. For more information, email selhag@advancedco. com or visit advancedco.com. n

A CORNERSTONE OF SMART BUILDINGS

THE IMPORTANCE OF INDOOR AIR QUALITY SENSORS IN COMMERCIAL REAL ESTATE

A greater focus on health, sustainability, and productivity, means that the need for optimal indoor environments in commercial spaces has never been more critical. Indoor air quality (IAQ) plays a major role in the well-being of employees and visitors, impacting everything from health to performance. Indoor air quality sensors are becoming an essential part of solutions to monitor and improve air quality in “smart” commercial buildings

As highlighted by independent industry analysts such as Memoori, connected devices and sensors in commercial buildings – together part of the Internet of Things (IoT) – is a significant area of growth. Foundational to the vision of “smart” commercial buildings are a new generation of connected sensors, providing insight and data on every aspect of a building’s operations, from lighting to security, from heating to occupancy.

Alongside other connected technologies, including video surveillance cameras, audio, and access control solutions, these support enhanced building security, safety for occupants, and improved operational efficiency. One emerging area of focus are environmental sensors, including those measuring air quality.

Why Indoor Air Quality Matters in Commercial Real Estate

The quality of the air we breathe significantly impacts our health, productivity, and overall well-being. In commercial real estate, where employees often spend many of their waking hours, poor air quality – often also referred to as Indoor Air Pollution (IAP) – can lead to a range of issues. These include:

• Health issues: Research has shown that exposure to pollutants like volatile organic compounds (VOCs), allergens, or elevated carbon dioxide (CO2) levels can trigger respiratory issues, fatigue, headaches, and more severe long-term health conditions.

• Reduced productivity: A study by Harvard University found that employees in poorly ventilated environments with high levels of CO2 may experience decreased cognitive function, concentration, and energy.

• Compliance with regulations: As environmental standards become more stringent, especially with a focus on sustainability and employee well-being, commercial buildings are increasingly required to meet specific air quality standards.

• Tenant turnover: Whether it’s an office, retail space, or multi-tenant building, IAQ plays a significant role in tenant retention. Building owners and operators who prioritize air quality are seen as more responsible and tenantfriendly, potentially leading to higher occupancy rates and lease renewals. The increasingly critical importance of the issue has led to the use of connected technologies to help measure and monitor IAQ. Central to these solutions are IAQ sensors.

What Are Indoor Air Quality Sensors?

IAQ sensors are devices designed to measure various air pollutants and environmental parameters in a building. These sensors can detect levels of particulate matter (PM2.5 and PM10), carbon dioxide (CO2), volatile organic compounds (VOCs), temperature, humidity, and even levels of carbon monoxide (CO). By contin-

uously monitoring these parameters, IAQ sensors provide real-time data to building managers, helping them make informed decisions about ventilation, filtration, and other methods of improving air quality.

The Role of IAQ Sensors in Commercial Buildings

IAQ sensors provide commercial real estate professionals with the information and data they need to actively monitor and improve air quality. Through continuous, real-time monitoring of air quality levels, should any pollutant reach an unsafe threshold, building management can receive instant alerts. This allows for immediate action to prevent health risks or discomfort for occupants.

The information provided by IAQ sensors allows property managers and building owners to make data-driven decisions about how to optimize air quality. For example, sensors can identify specific areas that require better heating, ventilation, and air conditioning (HVAC) system adjustments.

Making system adjustments in specific areas without needing to operate at full capacity throughout the entire building can help optimize HVAC system energy usage, while also potentially extending the life of equipment.

As a result, IAQ sensors contribute to a building’s overall sustainability goals by improving energy efficiency, reducing unnecessary waste, and positively impacting employee well-being.

In addition, many commercial real estate owners seek green building certifications like LEED (Leadership in Energy and Environmental Design). IAQ sensors can play a crucial role in meeting the indoor environmental quality requirements for these certifications, showcasing the building

PRODUCTS & SYSTEMS

owner’s commitment to sustainability. Finally, as businesses increasingly adopt wellness-focused strategies, air quality becomes an essential part of ensuring a healthy indoor environment. IAQ sensors provide a measurable way to guarantee that air quality standards are met, directly benefiting tenant satisfaction and employee well-being.

The Future of IAQ Sensors in Commercial Real Estate

The role of IAQ sensors in commercial real estate will continue to evolve as technology advances. Sensors will become more integrated with other “smart building” systems, including automated lighting, heating, and cooling. This integration will enable buildings to automatically adjust to optimize air quality, energy efficiency, and occupant comfort.

With the help of AI and machine learning, such sensors could predict potential air quality issues before they occur, helping building managers perform proactive maintenance on HVAC systems. Building owners may also leverage sensor data to engage tenants and employees by providing real-time information on air quality conditions. Some may even integrate IAQ monitoring into tenant-facing apps, empowering people to monitor and improve their own work environments.

An Essential Part of a Healthy Environment

Indoor air quality is no longer just a “niceto-have” factor in commercial real estate; it is a key element that affects tenant health, productivity, energy efficiency, and sustainability. By incorporating IAQ sensors into commercial buildings, owners and managers can ensure that their spaces are healthy, comfortable, and in compliance with evolving regulations. As technology continues to advance, IAQ sensors will play an even more vital role in shaping the future of the commercial real estate industry, creating environments that prioritize both the health and wellbeing of all who occupy them. n

TOUCHLESS ENTRY INTO BUILDINGS

UNIVERSITY OF DUNDEE SELECTS HID’S INNOVATIVE ACCESS CONTROL SOLUTIONS

To modernize its campus and improve the student experience, the University of Dundee has adopted HID’s advanced mobile access technology. With a focus on safety, sustainability, and future-proof scalability, the university is replacing plastic cards with smartphone credentials — making access faster, easier, and touchless across its facilities

n By: Sam Cherif, Senior Director & Regional Business Head, HID PACS MEA, HID Global sam.cherif@hidglobal.com

The University of Dundee is a public research university in Scotland, renowned for its academic excellence in dentistry, medicine, engineering, and life sciences. Based in the heart of the city, it is home to over 16,000 students, 3,300 staff, and is ranked 33rd in the Sunday Times Good University Guide 2024. A thriving institution with ambitious plans for growth, it is currently building a new £40 million facility called the Innovation Hub. This will offer commercial organizations flexible laboratory, meeting, and office space, and it is anticipated that the Hub will create up to 280 new high-quality jobs over the next 10 years.

Overhauling Campus Access Amid Rising Security Demands

“We wanted a modern access control system which is safe, secure, and easy for everyone to use,” says Colin Stebbing, the University’s Head of Precinct Services. “Complying with forthcoming legislation was also another important project

requirement. With bills like Martyn’s Law soon to be enacted, ensuring the university is ready for this was important given that we have a duty to protect, to ensure everyone is safe.”

Martyn’s Law will be introduced to improve protective security and organizational preparedness across the UK

by mandating, for the first time, those responsible for certain premises and events to consider the terrorist risk and how they would respond to an attack. The University also wanted a solution that would allow it to not only lock down buildings immediately but scale over time, so that the chosen equipment would last long term.

Furthermore, the University previously used a system that involved printing and issuing plastic RFID cards for staff and students to access buildings. This process was laborious and time-consuming, especially during peak times like Freshers Week, when some 2,500 – 3,000 undergraduate and postgraduate students enroll. Issuing cards was logistically complex due to the high demand and the need for thorough identity checks, which could take up to 10 minutes per card. These challenges prompted the University to seek a more efficient solution for issuing access credentials.

Seamless Mobile and RFID Access Across 40 Buildings

With more staff and students returning to the site since the pandemic, the University of Dundee recognized the significant benefits of implementing HID Mobile

Access and signature HID Signo readers throughout its city campus to guarantee modern, secure, and reliable access control — allowing staff and students to enter using both RFID cards and smartphones. The project involves buying and installing new mobile-ready HID Signo readers at approximately 40 buildings in a staged rollout over a two-year period by specialist security installer, Scottish Communications Group. In addition, the university has purchased 10,000 HID Mobile Access licenses to offer its academic community the option to use their Apple and Android smartphones for touchless entry into its facilities.

The new HID Signo readers integrate with the University’s existing AEOS access control software from Nedap. Supporting both native Bluetooth and Near Field Communication (NFC) connectivity, they allow touchless smartphone entry and are quick to install as the wiring uses common protocols like OSDP [Open Supervised Device Protocol] and Wiegand. Shifting to HID Mobile Access — which utilizes HID Origo management software running in the cloud — also delivers wireless credentialing. This significantly simplifies all the licensing, allocation of credentials, setting of building access rights, validating or revoking of IDs — all of which is now done virtually and remotely, saving both time and money.

In addition, Scottish Communication Group is supplying Motorola MOTORTRBO Ion smart radios to the university’s security staff. The radios will be configured to run HID Mobile Access so they can open doors fitted with the new HID Signo readers. Because these smart radios also link

to the university’s CCTV and alarm systems as well as the CriticalArc Safezone App, security staff need to carry only a single device to fulfill their duties.

Faster, Smarter, and Future-Proofed Student Access

“Once registered by Student Services in AEOS, students simply receive an email to their phone, they tap on a link, the app automatically uploads, and a mobile credential is granted,” says Paul Brady, HID’s End User Business Manager for Physical Access Control. “Not only does this improve the overall student experience because it’s substantially quicker and more efficient, but it’s far more sustainable as you’re not issuing PVC cards anymore. I’m confident students will embrace this technology and it will become an important consideration when students are choosing which university to attend.” While the strategy and aspiration are for the university population to shift wholesale to mobile access, its approach today is to operate a dual system. “We recognize that some visitors and staff still want to use a physical pass and not all employees have a university-issued mobile,” explains Stebbing. “HID Signo readers allow us to run both credential types in tandem, with HID Mobile Access giving us the option to scale up to include digital wallets from Apple and Google, as well as integrate with digital campus cards should we decide to go down this route in the future.”

Paul Brady adds, “The sky really is the limit with mobile technology as new possi

“We wanted a modern system which is safe, secure, and easy for everyone to use. The HID solution also has built-in functionality which we can leverage over time, meaning we’ve invested in ‘futureproof’ equipment which will last us long term.” Colin Stebbing, Head of Precinct Services, University of Dundee

bilities are emerging all the time, such as smart building integration, ROI opportunities, health & safety features, and time & attendance monitoring. Any investment made now is future-proofed as the technology can be built on as the years go by.”

Given that RFID cards are still required today, the University of Dundee utilizes its reliable FARGO DTC4500e printers, backing up this transition to digital transformation. The FARGO range of ID card printers integrates easily with the AEOS software so that Student Services staff can easily issue physical IDs themselves.

“HID Signo readers are going in now across the main buildings, including the new Innovation Hub site,” says Stuart Leslie, Scottish Communications Group’s director. “HID’s reputation is built on reliability and security, with its solutions supporting the latest encryption, communications, and authentication standards. Their devices have an open architecture, so they’re easy to install and integrate, which reduces the cost for the university and makes time to value that much quicker.”

“I have every confidence in the HID solution. The rollout is going nicely and there are no hiccups,” Stebbing concludes. “We’re enthusiastic about HID Mobile Access and once they register and download the HID app, we have every confidence that students will be too, given they

NO MORE BLIND SPOTS

TRASSIR REDEFINES LOGISTICS

SECURITY AND EFFICIENCY

Warehouses and logistics centers are the backbone of modern commerce — built for speed, scale, and precision. Yet when goods go missing or operational hiccups occur, the entire flow can grind to a halt. In a region like the Middle East, where rapid growth and complex supply chains demand flawless execution, these challenges are magnified

Traditional CCTV and perimeter protection solutions simply don’t cut it anymore. Reviewing hours of footage manually is tedious and often inconclusive. Up to 30% of warehouse losses remain unexplained worldwide, largely because there’s no clear, real-time way to track the chain of custody for every product movement. That’s why forwardthinking logistics hubs are turning to TRASSIR — a specialist in intelligent video surveillance and AI-driven security — to gain deeper insight, improve operational control, and minimize shrinkage across the supply chain.

Seeing the Unseen: From Blind Spots to Full Visibility

TRASSIR’s logistics-focused platform centers around ActiveStock, an advanced video analytics module designed to integrate tightly with warehouse management systems (WMS). Instead of passively recording, ActiveStock actively links video footage with product movements, barcode scans, and order picking events. Warehouse operators

benefit from this in multiple ways. Faster investigations mean that, instead of hours, incident reviews take minutes by automatically filtering footage to relevant times and zones. Improved accountability comes from tracking every movement visually, minimizing blind spots, and ensuring that losses are traceable and preventable. Operational

awareness is enhanced when paired with the Workplace Detector, as TRASSIR monitors employee presence and behaviors, flagging unauthorized access, absences, or deviations from protocols. This digital layer of awareness turns warehouses into smarter, safer environments, thus reducing shrinkage and supporting smooth workflows.

Handling high-risk materials like oil and petroleum, TLP implemented TRASSIR’s VMS along with AutoTRASSIR license plate recognition and integrated camera feeds to secure critical zones and monitor vehicle access in real time

Real-World Success in the Middle East and Beyond

Saudi Logistics Services (SAL), managing a busy air cargo terminal in Dammam, faced a complex challenge with over 300 cameras from different brands and an outdated VMS that slowed response times. TRASSIR helped unify their system with NeuroStation and AnyIP technology, adding AI-driven tools for real-time incident response and operational oversight. The result? Faster loss detection, automated checks, and a more secure terminal — all without burdening staff with extra work. Another strong example is Terminales y Logística Portuaria SA (TLP) in Paraguay. Handling high-risk materials like oil and petroleum, TLP implemented TRASSIR’s VMS along with AutoTRASSIR license plate recognition and integrated camera feeds to secure critical zones and monitor vehicle access in real time. These implementations highlight how TRASSIR’s scalable, modular solutions support logistics centers of all sizes and complexities.

Smarter Vehicle, Cargo, and People Management

Logistics operations involve countless moving parts — from trucks entering

the facility to cargo moving within warehouses, and staff navigating busy floors. TRASSIR’s intelligent surveillance platform ties it all together. AutoTRASSIR and AutoTRASSIR Parking automatically recognize vehicle license plates, streamline parking, and control gate access, eliminating manual logs and delays. ActiveStock tracks cargo movement and integrates with WMS to reduce loss and speed up incident resolution. Workplace Detector and Neuro Counter ensure employees are in the right places, follow safety protocols, and monitor foot traffic across the facility.

This comprehensive visibility means managers have a real-time command center at their fingertips, while reducing bottlenecks, preventing theft, and ensuring operations flow smoothly.

Why Middle East Logistics Trust TRASSIR

As regional trade hubs and supply chains grow increasingly complex, Middle East warehouses and logistics centers require flexible, intelligent solutions. TRASSIR’s platform is built to meet these evolving needs, offering seamless integration with existing camera infrastructure and security systems to protect past invest-

ments while enhancing capabilities. Its modular and scalable design makes it suitable for everything from small fulfillment centers to large national distribution hubs. At the heart of the system is advanced AI-powered video analytics that transform passive footage into actionable insights. The platform is managed through an intuitive, centralized interface that provides automated alerts and detailed reports. TRASSIR also delivers reliable hardware, featuring the latest cameras with advanced detection features and excellent image quality, even in challenging lighting. All solutions are backed by a five-year warranty and dedicated support teams across the region.

Looking Ahead: Smarter, Safer Logistics

In the logistics industry, downtime and losses aren’t just inconvenient — they’re costly. TRASSIR equips Middle East logistics operators with tools that not only monitor but understand and act, supporting safer, more efficient operations. With faster investigations, fewer blind spots, and a culture of accountability, warehouses and terminals can meet today’s demands and prepare for tomorrow’s growth. n

40 YEARS OF RELIABLE, LONG-LASTING TECHNOLOGIES

NEXT-GENERATION READERS COMBINING ENCRYPTION, DESIGN, AND RELIABILITY

As smart cities and critical infrastructure rapidly expand, the demand for secure and flexible access control systems is at an all-time high. XPR meets this challenge with advanced encryption and robust design, tailored to the conditions of the Middle East and beyond

n By: Amélie Dierckx, Marketing Director, XPR Group marketing@xprgroup.com

Against the backdrop of rapid growth in critical infrastructure projects and smart urban developments, the demand for highly secure and easily integratable access control solutions has reached new heights in the regional context. For almost 40 years, XPR has supported integrators and controller manufacturers with reliable, long-lasting technologies. Today, the company is combining the encryption power of Xsecrure® with the versatility of the Xpro reader range to meet the demands of the market in the Gulf and beyond.

Security Designed for Integration

Xsecrure®, which was developed in-house, replaces traditional Card Serial Number (CSN) identification with encrypted credentials and fully authenticated end-to-end exchanges. Leveraging the AES encryption native to MIFARE DESFire cards and XPR’s proprietary key diversification algorithm, the system prevents the duplication or tampering of credentials. This means that integrators benefit from a secure-by-design solution that is fully compatible with standard market protocols (OSDP, RS-485, and Wiegand) and simple to integrate with existing controllers.

The Xpro Range: Built for Every Environment

The Xpro range includes three models — XP-K with a backlit keypad, XP in a universal standard format, and XPM in a mullion format — enabling integrators to address both high-end installations and industrial environments. Soon, the range will be expanded with an RFID/QR code reader and request-to-exit buttons, offering even more flexibility to integration partners. Designed for dura-

bility, Xpro readers are IP65 and IK10/IK11 certified, operating from -30°C to +65°C, ensuring performance and reliability in the challenging climate conditions of the Middle East.

Regional References That Speak to Professionals

XPR has recently delivered several hundred readers on a fasttrack basis to secure strategic transportation infrastructure, as well as robust and aesthetically refined devices for a major regional hospital. These projects demonstrate XPR’s ability to support its integrator partners in the rapid and compliant deployment of solutions for critical environments, while also meeting their functional and architectural requirements.

“We design our solutions with integrators and controller manufacturers in mind, ensuring they have reliable, secure, and easyto-deploy tools. The Middle East is a strategic market in which we are investing for the long term,” says Deepak Israni, XPR Group’s META Sales Director. n

READERS WITH UNLIMITED POSSIBILITIES

Strong and elegant, the Xpro range combines multi-technology security with full customization. Powered by Xsecure®, it delivers a unique layer of advanced protection.

Compatible with MIFARE® (13.56 MHz) and supporting RS-485, OSDP, and Wiegand, Xpro is easy to configure via USB-C or programming card.

Includes free setup software, and is certified IK10 / IK11, IP65, withstanding -30 ºC to +65 ºC.

REINVENTING HOSPITALITY WITH DIGITAL ACCESS

MOBILE EXPERIENCE IS WHAT MAKES HOTELS MEMORABLE

Safety and convenience are critical factors when choosing holiday or business travel accommodation. Putting smartphones at the heart of the experience can maximize both. Thankfully, a wireless, cost-efficient upgrade to digital door security will help almost any hotel or rental property deliver this – and stand out from their competition

n By: Thomas Schulz, Director & Head of Marketing DAS EMEIA, ASSA ABLOY Opening Solutions EMEIA thomas.schulz@assaabloy.com

Keys have been part of hotel management for so long that it’s easy to miss how much work they create for both staff and guests. While they are away from home, this new generation of travelers prefers hassle-free arrivals and a seamless stay. At the same time, hotel staff seek smarter working and property managers target improved financial performance. A mobile guest experience, with flexible digital access at its core, can provide it all.

According to EHL Business School, “Mobile apps are enabling guests to access services and amenities conveniently, from self-check-in kiosks to digital front desks, and many hospitality businesses are adopting a staff-less or minimal-contact model to improve efficiency and guest satisfaction.” In hospitality, just as in so many other areas of life, the mobile is at the core of a seamless experience. The smartphone is already an essential travel companion – a means to communicate, a boarding pass, a payment card, a map, and much more. Only logical, then, it also becomes the room key.

Contactless check-in and mobile keys are the heart of hotels’ new seamless guest experience

Mobile Digital Access Custom-Designed for the Hospitality Sector

TESA Hotel is part of a suite of connected Digital Access Solutions from ASSA ABLOY and custom-designed for hospitality accommodation. This flexible access management solution unifies lock hardware and software in one system.

The product range includes robust locks in multiple configurations and in-room devices, all with a broad choice of contemporary aesthetics. Battery-powered and wireless, they come in multiple finishes and designs.

Guests unlock their rooms and common areas with mobile keys on their smartphones instead of mechanical keys. Mobile keys transform the guest experience, reducing or eliminating queues at the

reception desk for check-in or out. For managers, switching to mobile keys cuts the hassle and expense of replacing locks when a physical key goes missing. It is simpler and almost cost-free to issue a new one. Mobile keys also contribute to efforts to reduce single-use plastics. With real-time, remote control over all doors, staff can react instantly to any on-site incident, keeping guests safe and satisfied during their stay.

TESA Hotel offers this mobile key solution via the Openow app. Openow’s roadtested functionality – and the chance to personalize it with a hotel brand – brings mobile keys within reach for any property, not just global brands with multimilliondollar technology budgets. Beyond guestroom doors, common areas, parking, the spa, or a gym may be unlocked by app. Travelers download the app and register via email. Their room assignment and virtual key arrive automatically. With a few clicks in TESA’s intuitive manage-

ment software, staff can amend or cancel key validity – to offer a late check-out time remotely, for example.

Of course, the TESA Hotel solution also gives hotel managers the choice of traditional card and tag RFID credentials, or a check-in by PIN function, which minimizes the need for 24/7 staffing. System management for each configuration of TESA Hotel is intuitive, with minimal training needed. Any staff member who handles a multitude of keys for rooms, common areas, and services will find TESA Hotel a breeze. It saves them hours of admin time.

Boosting Convenience at Hotels and Holiday Rentals

Hotels and holiday rentals increasingly see digitalization as part of their 21stcentury guest experience. To help deliver the benefits, TESA Hotel solutions have upgraded the guest experience at ho-

tels, holiday apartments, campsites, and farm-stays worldwide.

For example, when Hotel Flint in Austria renovated 19th-century Villa Weiss and added a 21st-century structure, they sought an intelligent access solution that would both impress aesthetically and help staff provide services more effectively. They needed a flexible system administration to keep them in control – even remotely – and which would future-proof door security and services.

The Flint chose TESA Wireless Online access management with 80 TESA iminimal electromechanical door locks, wall readers, and fire-certified TESA imax locks. This complete, future-proof technology solution is equally suited to a historic building as to a contemporary structure. Digital door devices help Flint to offer their guests self-service check-in and room access by smartphone.

Harpazul, a new holiday apartment complex in Spain, chose a different TESA solution. The same stylish, wire-free digital locks now secure its main access points, recreation areas, and individual apartments. However, they selected the Check-In by PIN solution to make late arrivals stress-free. Booking confirmation and follow-up messages provide each party with a unique PIN to enter Harpazul, move through common areas, and access their room.

“This way we offer a better service to the customer because they don’t have to queue at reception,” says Harpazul’s Roi Casal. “It is as easy as sending the PIN via email.” Their TESA devices are fully compatible with card and smartphone unlocking if Harpazul introduces either option in the future.

“Freed from reception queues and timeconsuming key handling, staff can really make a difference with service,” says Iñigo Aldalur, TESA Hospitality Sales Manager at ASSA ABLOY Opening Solutions EMEIA. “This is the beauty of the TESA Hotel digital and mobile solution: It enables hotel managers to focus efforts fully on keeping guests happy, which means they come back again – and tell all their friends, too.” n

ASSA ABLOY Opening Solutions EMEIA / Hotel Flint

SMART ACCESS CONTROL FOR CRITICAL INFRASTRUCTURE

IDTECH IS SETTING NEW STANDARDS IN SECURITY INTEGRATION

From energy and utilities to government buildings and transportation hubs, the demand for intelligent, integrated, and resilient access control systems is driving a new wave of innovation across the security industry. At the forefront of this transformation is IDtech, a European access control specialist with a growing international footprint and a strong reputation for protecting high-stakes environments

n By: Thomas Deville, General Manager, Middle East & Africa, IDtech tdeville@idtech.eu

In an increasingly interconnected and high-risk world, protecting critical infrastructure is no longer a matter of physical barriers alone. In this article, we will explore the latest innovations in securing critical infrastructure, IDtech’s integration with best-in-class video and AI technologies, and major reference projects that demonstrate how these systems are being deployed in real-world scenarios in the Middle East.

Innovations in Access Control for Critical Infrastructure

The security landscape for critical infrastructure has become significantly more complex over the past decade. Beyond guarding entry points, today’s access control systems must offer multi-layered protection, situational awareness, and adaptive threat response, all while complying with stringent data protection and operational standards. Some of the most important innovations now reshaping this field include AI-powered credential verification, where facial recognition, behavioral biometrics, and multi-factor authentication systems improve

both security and user convenience; and cloud-enabled platforms, which allow central management of multiple remote sites with rapid scalability and secure data storage. Other key trends are integration with video analytics, where combining access logs with live video verification enables operators to detect anomalies instantly and respond to threats proactively; and cyber-resilient architecture, as physical security systems become part of broader IT ecosystems and protecting them from cyber threats becomes a top priority. These technologies are converging to build smart, proactive security environments

capable of preventing incidents rather than simply recording them.

Access Control + Video: A Seamless Integration with Milestone XProtect

IDtech has long been known for its robust, enterprise-grade physical access control systems (PACS), widely deployed across Europe’s most sensitive facilities. But its latest offerings go far beyond traditional door control.

Today, access control and video offer seamless integration with Milestone XProtect.

One of IDtech’s standout developments is its tight integration with this leading video management system. This integration gi ves users a unified interface where video feeds are automatically linked with access events. It enables real-time verification, allowing operators to instantly see who accessed a door and whether their credentials matched their identity on camera. Alarm synchronization ensures suspicious access attempts trigger video bookmarks and alerts across systems, speeding up investigations. Finally, streamlined forensics simplifies review and reporting in case of security incidents. By bridging physical access and surveillance into a single ecosystem, IDtech ensures that security teams are not just watching, but understanding and responding in real time.

AI-powered PACS: Advanced Video Analytics with Aicuda

In partnership with Aicuda, a specialist in intelligent video analytics, IDtech is taking access control even further. Their joint solutions add a layer of AI-based interpretation to the system, unlocking capabilities such as facial recognition, which enables seamless identification of personnel even in low-light or masked conditions. License plate recognition (LPR) automates vehicle access based on driver credentials and site-specific permissions. Object and behavior detection identifies unusual objects or behavior patterns near secure zones, while PPE detection ensures workers entering hazardous areas wear mandatory protective equipment, enhancing both

These tools not only bo ost security effectiveness but also support operational oversight and regulatory compliance, especially in sectors like energy, manufacturing, and transport.

Proven Deployments: Key IDtech Projects in the Middle East

With growing geopolitical and infrastructure investment across the Middle East, IDtech has delivered several high-profile projects in the region, tailored to local needs such as data sovereignty, cybersecurity regulations, and environmental resilience.

Cloud-Based Access Control System Hosted on Oracle Cloud Infrastructure

IDtech implemented a fully cloud-hosted access control and alarm management solution on Oracle Cloud Infrastructure (OCI) in one major deployment for a UAEbased critical infrastructure, showcasing the capabilities of a cloud-based access control system. This project stands out for its data sovereignty compliance, with all data hosted within the country’s borders in full accordance with national regulations. Cybersecurity hardening includes advanced encryption and continuous vulnerability monitoring. Integration with Avigilon Unity allows IDtech PACS to work seamlessly with Avigilon’s

VMS, providing real-time visual verification and advanced video analytics. Scalable multi-site management gives a single cloud dashboard control over access across three critical sites, complete with granular access policies and audit trails. The project reflects a broader shift toward secure cloud adoption in critical infrastructure, balancing flexibility with stringent local compliance.

Securing an ADNOC Gas Site with Explosion-Proof Surveillance and AI

Another notable deployment involves securing the entrance of an ADNOC Gas facility, where safety and surveillance requirements are exceptionally high due to the nature of operations. Here, IDtech integrated its access control system with explosion-proof Axis cameras to monitor entry zones exposed to hazardous materials and Aicuda analytics performing: Facial recognition for employee and visitor validation, License plate recognition for automated gate control, Object detection to flag abandoned items or unauthorized materials such as telephones, PPE detection to ensure all staff entering the site meet safety standards. This project illustrates how access control and AI-driven video analytics can serve dual purposes: securing sites and enforcing safety compliance, a growing priority in industrial and energy environments.

Toward Smarter, Safer Infrastructure

As critical infrastructure becomes a focal point for both physical and cyber threats, the integration of intelligent, adaptable access control systems is no longer optional — it is essential. IDtech’s approach combines proven reliability, cutting-edge integration, and deep domain expertise, particularly in high-risk and compliance-intensive sectors.

Whether deploying cloud-based solutions with strict data governance or fusing AI analytics with traditional access control, IDtech is helping organizations take the next step toward proactive, intelligent security. n

HIGHER SECURITY AND EFFICIENCY

SMARTER ACCESS CONTROL IN HEALTHCARE

Healthcare organizations work in complex environments that demand high standards of security and efficiency. Hospitals and clinics must protect patients, staff, and sensitive assets while ensuring that legitimate access is seamless, supporting critical care at all hours. As the range of threats and operational challenges grows, robust access control has become essential to both safe and efficient healthcare delivery

Healthcare facilities must accommodate a mix of open public spaces and highly controlled zones. Lobbies and cafeterias require welcoming accessibility, while operating theaters, Intensive Care Units (ICUs), and pharmacies need stricter access, including dual custody (two authorized persons present) for extra-sensitive areas. Staff such as consultants and nurses often work across several sites, so a unified, centrally managed credential system is critical to ease operations, managing multisite access with one single credential. Visitor and contractor management adds complexity. Hospitals host diverse visitors, family, delivery staff, and contractors, each posing security considerations. Secure check-ins with identity verification, temporary credentials, and digital audit trails all help keep track of who enters restricted zones and when. Automated systems reduce the administrative burden and support compliance efforts by creating accurate, searchable access logs.

Emergency Response Capabilities

Fast and coordinated emergency response saves lives in healthcare settings. Features like blue light corridors ensure immediate paths are cleared for patient transfers during emergencies, opening doors and prioritizing lift access so medical teams can move quickly. Lockdown capabilities offer swift containment of security threats. Whether the concern is a missing patient or an aggressive intruder, a lockdown isolates specific zones or secures an entire facility, while still granting access to emergency responders. This flexibility means staff and other patients are better protected until the situation is resolved.

Seamless integration with communication systems is key. When a lockdown or emergency protocol engages, automatic alerts keep staff informed and operations coordinated, ensuring efficient care continues where possible while security focuses on the threat.

System features like door interlocking and anti-passback help ensure only the right individuals can enter sensitive spaces and that credentials can’t easily be misused

Compliance and Regulations

Local and national healthcare security standards dictate access control requirements for hospitals, including secure entry points, visitor management protocols, and mandatory security audits. Compliance with these regulations is essential to avoid legal liabilities and protect patients and staff from security risks.

Solving Healthcare’s Unique Demands

The ICT Enterprise Access Control platform, Protege GX, is designed to solve the unique problems of the healthcare sector. Its scalable, multi-site architecture allows hospitals to control access across many buildings with a single, centralized platform. This not only brings operational consistency but also reduces the risk of errors from duplicated databases or manual updates. System features like door interlocking and anti-passback help ensure only the right individuals can enter sensitive spaces and that credentials can’t easily be misused. These are especially useful for temporary staff or frequent contractors. Dual custody can be easily set up to add a level of security for sensitive areas, such as the pharmacy or medication cupboards. Protege GX’s emergency features, such as fast-trigger blue light corridors and instant partial or total lockdown, are integrated intuitively, allowing staff to respond quickly without technical barriers. Importantly, Protege GX integrates with legacy databases, time and attendance trackers, and other systems, enabling healthcare sites to innovate their security without overhauling existing infrastructure.

In addition, the ICT solution combines access control and intrusion detection, allowing areas to be automatically armed and disarmed according to the time schedule and rules set-up for each. It enables both efficient security and operations across multiple buildings

Landspitali Hospital: A Practical Example

The Landspitali healthcare facility, the largest one in Reykjavik, Iceland, illustrates the impact of smart access control. Like many hospitals, Landspitali initially struggled with access to restricted areas, keeping staff and patients safe, and maintaining efficient visitor management.

By implementing ICT Protege GX, Landspitali established secure and clearly defined zones, allocated access rights based on roles, and automated visitor processes with digital logs and check-in protocols. Emergency blue light corridors decreased patient transfer times, while versatile lockdown protocols let staff isolate areas during incidents. These improvements resulted in fewer delays, stronger compliance, and greater peace of mind for everyone on site. Staff noted the system’s reliability and straightforward operation, demonstrating that powerful security doesn’t need to be complicated. By leveraging automation and flexible controls, Landspitali significantly improved both safety and operational performance. The path Landspitali followed offers a roadmap for other healthcare facilities seeking to strengthen security while improving dayto-day efficiency. With tailored solutions like Protege GX, access control becomes more than a necessary tool - it serves as a partner in delivering safer, more effective care and securing organizational success. n

ADOPTED ACROSS THE REGION

THE AI VIDEO INNOVATIONS

OFFER IMPRESSIVE VALUE FOR USERS

IDIS is transforming video surveillance with a new generation of AI-powered solutions that deliver enhanced safety, operational efficiency, and ease of use. From real-time threat detection to faster video search and smart privacy masking, these innovations are making advanced security more accessible and effective across sectors

n By: Dennis Choi, General Manager, IDIS Middle East & North Africa sales_mena@idisglobal.com

Advanced video analytics solutions are now being adopted by an ever-wider range of users across the region, and not just in higher security, critical infrastructure, and government applications, but in many sectors where application-specific uses for AI are being developed and taken advantage of. Improved value, performance, and easy uptake of AI video solutions are having a positive impact. For example, the latest tech releases from IDIS are making it more practical and affordable to harness AI for both surveillance system upgrades and new installations, with options that include system-wide analytics and targeted, location-specific AI video.

Force Multiplying Efficiency

As a result, force-multiplying functionality has become easily available for many more users in settings from healthcare to education, from logistics and transportation to retail and hospitality. IDIS’s new Edge AI Plus Camera range is giv-

ing organizations the ability to increase security and safety and to enhance operational efficiency with automated detection of a wider range of risk events, easier real-time video search functions, and other useful tools, including more accurate live privacy masking. The Edge AI Camera Plus range features IDIS’s latest analytics engine, IDLA Pro. With on-theedge analytics capabilities and four new essential functions, including crowd detection, abandoned and removed object detection, and fall detection, to support

preventative and proactive security and safety responses.

Improving Safety, Freeing up Staff

Fall detection, for example, is being adopted to improve safety in healthcare and assisted-living settings, where it is supporting faster response if somebody gets into difficulty, while freeing up staff from the need to continually monitor video feeds. The same technology is being used

to reduce the risk of harm from accidents in industrial and logistics settings, and to improve safety in public spaces, sports, and recreation settings where there is a higher risk of injuries.

Removed or abandoned object detection is being used to detect potential terrorist activity in public spaces, transit networks, and critical infrastructure settings; elsewhere the same detection capability is providing automated warnings if fire extinguishers are removed, if fire doors are blocked or left open, if emergency exit routes are obstructed, or if high value equipment or assets are moved - everything from medical equipment to vehicles and machinery.

In logistics settings, car parks, and loading bays, AI video enables the immediate relay of alerts to security teams when people or vehicles enter unsafe or restricted areas. Where it would once have been too expensive or impractical for human eyes to monitor multiple scenes 24/7, AI video now makes this practical. And thanks to IR, WDR, and a larger sensor (1/1.8”), the cameras ensure outstanding HD image capture and

threat detection even in challenging lighting conditions, including bright sunlight and darkness.

Smarter, Faster Searching

Further reducing time-consuming activity for monitoring teams, IDIS’s enhanced real-time search function, A-Cut, is a powerful live monitoring technology that uses AI to overcome the challenge of locating crucial scenes among vast amounts of video footage. A-Cut makes any target object or person easier to find by automatically extracting the best representative images, cropping them, and presenting them for operators to select. Simply by clicking on the cropped image, the operator is taken to the precise moment in the video stream when the object last appears (i.e., their most recent activity captured on camera).

Each cropped image is indexed as a searchable visual moment, supporting faster identification. The cropped images become even more powerful search tools when combined with IDIS AI Search functions. Every cropped image is classified

into three categories: people, faces, and vehicles. To make tracking easier, A-Cut, combined with AI Search, also identifies object attributes and allows for filtered searches – such as searching for people by age and gender, clothing color, or whether they have accessories like glasses, hats, masks, or bags; or searching for vehicles by color or type.

The benefits of automated detection and easier real-time tracking go beyond improved security and reduced risk of events being missed. AI video solutions are allowing security response staff to be redeployed away from their monitoring stations, to provide a more visible and reassuring presence, and to deliver faster responses when incidents occur.

Maintaining Privacy without Compromising Security

Supporting more responsive live surveillance operations in settings where privacy and compliance are a concern –such as international hotels, healthcare, and government facilities – IDIS Smart Privacy Masks offers a real-time privacy masking solution that protects individuals’ identities without compromising on the quality of video capture or the visibility it provides. The new, patented technology eliminates the challenges associated with conventional masking, maintaining high video resolution and frame rates even in busy environments.

Smart Privacy Masks adjusts mosaic strength for more finely calibrated masking, making it easier to distinguish people’s actions in real-time while always protecting individuals’ identities. And because IDIS Smart Privacy Masking takes place on board IDIS Solution Suite VMS, it is resource-efficient, ensuring stable, high-resolution video transmission to retain usable footage and forensic evidence. Added together, these latest AI video innovations from IDIS are unlocking significant benefits for users – not least the assurance of easy adoption of future innovations as they come on stream. n

NAVIGATING THE SECURITY MAZE

MODERN ACCESS CONTROL CHALLENGES IN DATA CENTERS

As data centers evolve into the backbone of digital infrastructure, their physical security requirements have grown exponentially more complex. Today’s facilities face unprecedented challenges that extend far beyond traditional lock-and-key mechanisms, demanding sophisticated solutions that address the convergence of physical and cyber security domains

n

Modern data centers rarely operate in isolation. The proliferation of hybrid ecosystems spanning on-premises infrastructure, cloud services, and colocation facilities has fundamentally altered access control requirements. Organizations must now orchestrate physical access policies across geographically distributed sites while maintaining alignment with logical access controls for servers, applications, and data repositories. The need for seamless integration between disparate security systems compounds this complexity. When a system administrator requires access to critical infrastructure spanning multiple facilities, traditional siloed approaches fail to provide the unified visibility and control necessary for comprehensive security management.

The Persistent Insider Threat

Statistics consistently demonstrate that insider threats represent one of the most significant vulnerabilities in data center security. Employees, contractors,

and vendors with legitimate access credentials pose unique risks that external threat actors cannot replicate. The challenge extends beyond simple credential management to encompass behavioral monitoring, privilege escalation detection, and the prevention of unauthorized access sharing.

Credential sharing and “tailgating” incidents remain prevalent, particularly in environments where convenience often

trumps security protocols. The human factor in security continues to be the weakest link in even the most technologically advanced facilities.

Integration Imperative

The era of standalone physical access control systems has ended. Modern security architectures demand seamless integration with identity management

platforms, Security Information and Event Management (SIEM) systems, and emerging Zero Trust frameworks. Organizations that maintain legacy systems in isolation create dangerous security gaps that adversaries readily exploit.

The challenge lies not merely in technical integration but in establishing unified policies and procedures that govern both physical and logical access. This convergence requires sophisticated platforms capable of correlating events across multiple security domains and providing actionable intelligence to security teams.

Regulatory Compliance Complexity

Compliance frameworks such as ISO 27001, SOC 2, HIPAA, and GDPR impose stringent requirements for access logging, audit trails, and visitor management. While these regulations are essential for maintaining security standards, they create operational complexity that many organizations struggle to manage effectively.

The requirement for tamper-proof records, comprehensive audit trails, and real-time monitoring capabilities demands robust technological solutions. Organizations must balance compliance obligations with operational efficiency while ensuring that security measures enhance rather than hinder business operations.

The Remote Work Reality

The paradigm shift toward remote work has introduced new complexities in data center access management. Vendors, technicians, and contractors frequently require temporary access credentials, creating a constant stream of privilege management challenges. Traditional approaches to credential provisioning often prove inadequate for dynamic, short-term access requirements.

Remote access approval processes must balance speed with security, enabling legitimate users to gain necessary access quickly while maintaining rigorous verification protocols. This balance requires sophisticated workflow management and real-time verification capabilities.

Scalability Constraints

As data centers expand to meet growing digital demands, access control systems must scale proportionally. The proliferation of endpoints, users, and access points creates exponential complexity that traditional systems cannot adequately address. Biometric systems, mobile credentials, and video-linked access controls offer enhanced security but at significant cost and complexity.

Organizations must carefully evaluate the total cost of ownership for advanced access control technologies, considering not only initial implementation costs but also ongoing maintenance, training, and upgrade requirements.

At the same time, emerging tools like facial recognition, advanced biometrics, and AI-driven access control promise stronger security but bring risks such as false positives, privacy concerns, and user acceptance. These systems demand careful calibration and redundancy, since downtime in critical facilities can be catastrophic.

Cyber-Physical Convergence

The traditional distinction between physical and cyber security has become obsolete. Access control systems now represent potential cyber attack vectors, with compromised card readers and physical security systems serving as entry points for broader network infiltration. This convergence demands unified risk management approaches that consider the interconnected nature of modern security

PRODUCTS & SYSTEMS

threats. Organizations must implement solutions capable of addressing both physical and cyber vulnerabilities through integrated security architectures.

The Screencheck Advantage

Organizations seeking to address these multifaceted challenges require comprehensive solutions that integrate seamlessly with existing infrastructure while providing advanced security capabilities. Screencheck, through its platforms and integrated solutions, offers sophisticated access control solutions specifically designed to address the complex requirements of modern data centers.

These platforms provide unified identity verification, comprehensive audit trails, and seamless integration with existing security infrastructure. By combining advanced biometric verification with robust workflow management, Screencheck enables organizations to maintain rigorous security standards while streamlining operational processes.

Future Considerations

The evolution toward Zero Trust security principles will continue to reshape physical access control requirements. Cloudbased and AI-powered systems offer unprecedented scalability and intelligence capabilities, but introduce new attack surfaces that must be carefully managed. Success in this evolving landscape requires solutions that bridge the gap between physical security, identity governance, and cybersecurity. Organizations that invest in integrated, scalable platforms will be best positioned to address current challenges while adapting to future security requirements. he complexity of modern data center access control demands sophisticated, integrated solutions that address the full spectrum of security challenges. As the threat landscape continues to evolve, organizations must prioritize comprehensive platforms that provide unified visibility, control, and compliance capabilities across their entire security infrastructure. n

KEEPING THE WORLD TALKING

DRIVING SECURE TRANSFORMATION ACROSS THE MENA

Tabbara Electronics has positioned itself at the center of this transformation. With decades of expertise in two-way radio, video surveillance, and connectivity, the company is trusted by many partners and end users to deliver systems that operate reliably even in the most demanding environments

n By: Loubna Tabbara, Marketing and Sales Director, Tabbara Electronics loubna@tabbara-electronics.com

Across the Gulf and MENA region, governments and enterprises are accelerating investments in technologies that strengthen national security, protect infrastructure, and enable digital transformation. From border protection and transportation to energy and emergency response, the demand for resilient systems that keep decisionmakers connected and informed is growing rapidly.

Vision in Action: A Legacy of Leadership

Founded with a mission to bridge worldclass technologies with local execution, Tabbara Electronics has, over the past decades, evolved into a strategic distribution partner serving mission-critical sectors across the region. The company represents some of the most respected global brands, including Motorola Solutions, Pelco, Avigilon, and Barrett Communications, and is recognized for its technical depth, ethical practices, and long-term partnerships.

“Tabbara Electronics distinguishes itself through the strength of its portfolio and the value it delivers to partners. Guided

by clarity and purpose, we have transformed vision into regional impact, and we will continue to lead with the same determination into the future,” said Mohamad Tabbara, CEO of Tabbara Electronics.

More than a distributor, Tabbara Electronics acts as a technical partner, equipping system integrators, resellers, and service providers with the knowledge and support they need to deliver independently and at scale. Its commitment to pre-sales engineering, training, and aftersales service ensures that solutions continue to perform long after deployment.

Saudi Arabia at the Core of Regional Growth

Saudi Arabia is rapidly advancing its Vision 2030 strategy, with security and

digital resilience at the forefront. Tabbara Electronics supports this transformation by empowering trusted Saudi partners and system integrators with proven technologies that align with national priorities. By distributing and integrating platforms such as Motorola Solutions TETRA, DMR, and LTE networks, alongside Avigilon and Pelco AI-driven surveillance systems, the company delivers ecosystems tailored to the Kingdom’s security, public safety, and infrastructure needs. This approach ensures reliability, scalability, and compliance with local standards.

Technology with Trust

Tabbara Electronics believes that technology must not only perform under pressure but also earn confidence through

By distributing and integrating platforms such as Motorola Solutions TETRA, DMR, and LTE networks, alongside Avigilon and Pelco AI-driven surveillance systems, the company delivers ecosystems tailored to the Kingdom of Saudi Arabia’s security, public safety, and infrastructure needs

transparency and integrity. Every solution is designed to meet international standards while complying with local regulations and supporting national objectives. Long-standing partnerships with government agencies, enterprises, and critical operators reflect the company’s reputation for reliability and sustainable performance across the region.

Spotlight on Surveillance and Communications

In today’s security landscape, video surveillance is evolving from passive recording to intelligent decision-making. Through its partnerships with Avigilon and Pelco, Tabbara Electronics delivers advanced ecosystems that integrate AI-driven ana-

lytics, cloud-ready platforms, and open architectures. These solutions empower operators to detect, verify, and respond in real time, turning surveillance into proactive risk management.

What makes Tabbara Electronics unique is its dual appointment as distributor for both two-way radios and advanced video surveillance. By combining secure voice, data, and visual intelligence, the company enables partners to build unified missioncritical systems. Together with Motorola Solutions, they are creating safer cities, safer industries, and safer nations across the region.

Strategic Outlook: Building for the Future

As regional infrastructures expand and new threats emerge, the need for interoperable, future-ready systems is paramount. Tabbara Electronics is investing in next-generation platforms that bring together artificial intelligence, resilient field equipment, and cloud-enabled analytics to prepare operators for tomorrow’s challenges.

By aligning global innovation with local expertise, Tabbara Electronics empowers partners across the Gulf and MENA region with secure, reliable, and scalable solutions that protect lives, safeguard assets, and strengthen national resilience. As the region moves toward a more connected and secure future, Tabbara Electronics invites government agencies, enterprises, and system integrators to collaborate in building the next generation of mission-critical ecosystems. n

SMARTER AGAINST FIRE

BOSCH MEETS MIDDLE EAST’S HOSPITALITY BOOM

As the Middle East’s hospitality sector enters a new era of record-breaking growth, the demand for intelligent fire safety has never been greater. Hotels are turning to solutions that combine reliability, scalability and discreet design, ensuring seamless protection that safeguards guests, operations and reputations alike

n By: Santosh Kumar V, Building Technologies, Marketing Communications - South Asia & Middle East, Bosch Limited Santosh.Kumar@in.bosch.com

The Middle East is witnessing an unparalleled boom in hospitality development. From iconic skyscrapers and luxury resorts to sprawling entertainment complexes and mega-projects, new establishments are rising at an extraordinary rate to cater to surging tourism, business, and leisure demands. For safety managers overseeing these prestigious properties, this rapid expansion brings both immense opportunities and significant responsibilities. Grand facilities, a diverse and often high-profile guest demographic, and increasingly intricate architectural designs necessitate fire safety solutions that offer uncompromising reliability, seamless scalability for future growth, and maximum protection while ensuring an unblemished, world-class guest experience.

Within this exceptionally dynamic environment, Bosch stands as a vital partner, empowering hospitality establishments to safeguard their most valuable assets: their guests, their properties, and their global reputation. Through intelligent fire safety solutions that seamlessly integrate cutting-edge technology, sophisticated and discreet aesthetics, and streamlined, efficient maintenance, Bosch ensures unparalleled protection for both guests and operations, uphold-

ing the world-class, seamless, and luxurious experience that guests expect.

Proven Experience in Leading Hotels

Two hotel projects in Europe illustrate how Bosch creates value in the hospitality sector. At the Modern Times Hotel in Switzerland, the challenge was clear: deliver maximum safety while preserving the elegant, design-led environment. Bosch implemented the AVENAR 4000 multi-sensor detectors and invisible fire detectors that blend seamlessly with the

interiors. The result: highly reliable fire detection without compromising aesthetics. As Hotel Manager Fabian Büecheler emphasized, Bosch provided state-ofthe-art safety that matched the hotel’s design ambitions.

Similarly, the Hotel Van der Valk Venlo in the Netherlands required a full upgrade of its fire detection system during a large renovation project. The key challenge was continuity—keeping the hotel operational while enhancing safety. Bosch supplied and installed more than 350 AVENAR detectors, applied zone by zone in a carefully planned rollout that avoided

disruption. Thanks to this approach, the hotel remained fully functional throughout the upgrade.

These cases demonstrate Bosch’s ability to tailor solutions to the specific requirements of each hotel: safeguarding design, ensuring seamless operation, and providing dependable fire protection.

What Hotels Are Demanding Today

Across the hospitality industry, several Bosch solutions are in especially high demand. The AVENAR fire alarm panels stand out as modular and scalable systems that provide transparent, real-time remote monitoring, allowing safety managers to respond quickly to the first signs of fire. Complementing them are the AVENAR 4000 multi-sensor detectors, which use intelligent technology to ensure accurate detection while minimizing false alarms. For properties that prioritize aesthetics, invisible fire detectors deliver powerful protection without disrupting interior design or the guest experience. Finally, remote monitoring with the NEXOSPACE Fire System Explorer (FSE) offers safety managers real-time visibility, remote diagnostics, and predictive maintenance capabilities.

Why Hotels Choose Bosch

The reasons behind these choices are closely tied to the unique demands of hospitality. Reliability and trust remain paramount, as hotels cannot risk nuisance alarms or missed detection. Bosch’s advanced sensor technology ensures an early and accurate response in critical moments. Equally important is futureproof scalability since hotels are constantly expanding or upgrading their premises. Bosch systems are flexible and modular, making it easy to extend coverage or integrate new functions without replacing the entire system. Another decisive factor is guest comfort, as fire safety should remain invisible to the guest. Discreet detector design and remote maintenance help minimize disruption to daily operations. Together, these qualities align directly with the goals of every safety manager in this context: comply with safety regulations, operational efficiency, and a seamless guest experience.

Market Trends in Hospitality Fire Safety Demand for Bosch fire safety solutions points to important shifts in hotel operations and guest expectations. Safety as part of the guest experience is a defining factor, as modern hotels expect fire detection to be reliable and discreet, protecting guests without disturbing them. The hospitality

PRODUCTS & SYSTEMS

market is shaped by constant development: new wings, modernizations, and upgrades are part of daily business. Fire safety systems must therefore be adaptable and scalable, so hotels can expand seamlessly without compromising protection.

Another clear shift is digitalization and connectivity, with hotels increasingly embracing platforms like NEXOSPACE to gain transparency, optimize resources, and ensure faster response. At the same time, operational resilience is a growing priority, as the demand is not just for compliance but for systems that enhance efficiency, reduce operating costs, and minimize downtime.

These preferences underline a clear direction: the future of hospitality fire safety is smart, integrated, and guest-centric.

Shaping the Future of World-Class Hospitality

As the Middle East’s unparalleled hospitality sector continues its ambitious growth trajectory, cutting-edge fire safety remains absolutely central to operational excellence and paramount for securing guest trust. In this region, hospitality transcends lavish amenities; discerning guests increasingly prioritize a profound sense of peace of mind, confident that their safety and wellbeing are meticulously safeguarded by intelligent, seamlessly integrated, and nonintrusive technologies.

With solutions like AVENAR detectors and NEXOSPACE Fire System Explorer (FSE) for remote monitoring, Bosch helps hotels protect guests while optimizing operations. Its fire detection systems combine proven reliability, future-proof scalability, and guest-friendly design, helping hotels achieve the highest standards of safety while preparing for tomorrow’s growth. With Bosch, hotels acquire far more than a mere fire alarm system—they secure a strategic partner committed to safeguarding their most invaluable assets: their esteemed guests, their infrastructure, and their globally recognized reputation. In today’s hyper-connected, digital-first era, safety isn’t simply detected—it’s intelligently orchestrated and proactively managed. n

Hotel Van der Valk Venlo
Hotel Modern Times

Telecom Infrastructure

Antennas, cables, and passive components for reliable connectivity.

• RF Antennas

• RF Cables & Connectors

1/2” - 7/8” - D10 and more

• DAS & Passive Components

• Mounting Accessories

• Towers & Shelters

Linking Territories

From RF Infrastructure to Mission-Critical Solutions

Mission-Critical Solutions

Adaptive radios and tactical solutions for security and defense.

• Ad-Hoc Mesh Base Stations

• Portable Repeaters

• Industrial 5G Outdoor CPE

• Mission-Critical Radios

• Integrated LTE Solutions

• Tactical Surveillance

Microwave & Broadband

High-capacity backhaul and 5G-ready wireless solutions.

• High-Capacity Point-to-Point

• Point-to-Multipoint Networks

• Legacy Microwave (E1)

• 5G-Ready Connectivity

C-Band, L-Band, Airborne Mesh Solution
Airband / TETRA / UHF / VHF Bands

LEADING REGIONAL PLATFORMS

ISAF CONTINUES TO ATTRACT INTENSE INTEREST

ISAF, the largest gathering of the security industry in the region, is preparing to open its doors for the 29th edition, taking place from October 8–11, 2025. As in previous years, ISAF continues to attract strong interest not only from Türkiye but also from companies and professionals around the globe

ISAF, Türkiye’s largest security exhibition, will bring together the latest in security systems, smart home technologies, fire safety solutions, and globally recognized innovations shaping the future of the industry. Over 300 companies and more than 700 brands from both domestic and international markets will showcase their cuttingedge products. More than 20,000 visitors will explore these solutions, establish new business connections, and attend conferences shaping the future of the sector.

Theme of the Year: Fire Safety

Based on the lessons learned from recent fire disasters in Türkiye, the main theme of 2025 has been determined as “Fire Safety.” This theme will be emphasized throughout the exhibition with strong awareness initiatives. Over 25 Fire Department Chiefs from Metropolitan Municipalities and international experts in fire safety will take the stage to address critical challenges and present solutions. Key topics set to attract strong interest include first response to fires in electric vehicles, fire prevention methods and risk analysis in buildings, and technological approaches to combating forest fires. Additional focus areas will cover fire risks and response procedures in solar panel systems, as well as protective clothing and international safety standards. ISAF will not only be a platform for companies to

exhibit their products and technologies, but will also stand out with its rich and comprehensive conference program.

The Security of the Future

Special sessions themed “The Security of the Future,” organized in collaboration with GÜSOD (Security Services Organization Association), will be a highlight of the event. The program will also feature presentations from the Turkish National Police Private Security Inspection Directorate on “Standards in Security and Fire

Products,” along with content from the Public Cyber Defense Association, including “AI and Cybersecurity Training for Healthcare Institutions.” These sessions will bring together both local and international participants and visitors. Taking place at the Istanbul Expo Center between October 8–11, 2025, ISAF is expected to be highly dynamic this year. With a strong international presence, this year’s edition will continue to be one of the region’s leading platforms for both commercial collaboration and knowledge exchange. n

Key Security Events in 2025/2026

Key Security Events in 2023

SEP

Intersec Riyadh

29 Sep - 1 Oct 2025, Riyadh, KSA International Convention & Exhibition Centre (RICEC) https://intersec-ksa.ae.messefrankfurt.com/ ksa/en.html

Romanian Security Summit

5-6 Nov 2025, Bucharest, Romania Romexpo, Bucharest, Romania https://romaniansecuritysummit.com

ISE

3-6 Feb 2026 Barcelona, Spain Gran Via https://www.iseurope.org

LEAP

13-16 Apr 2026, Riyadh, KSA RECC Malham https://onegiantleap.com

APR NOV

FEB

OCT

8 - 9 Oct. 2025, Skopje, North Macedonia

Adria Security Summit

8-9 October 2025, Skopje, North Macedonia Aleksandar Palace Hotel https://www.adriasecuritysummit.com

JAN

Intersec Dubai 12-14 Jan 2026, Dubai, UAE World Trade Centre https://intersec.ae.messefrankfurt.com/dubai

MAR

light+building

8-13 Mar 2026, Frankfurt am Main, Germany Messe Frankfurt https://light-building.messefrankfurt.com

ISNR Abu Dhabi 19-21 May 2026 Abu Dhabi, UAE ADNEC Centre https://www.isnrabudhabi.com

MAY

Market & Contacts

TECHNICAL PROTECTION

Vendor-neutral Physical Security Information Management (PSIM) Bosch empowers you to build a

Advancis Middle East

P.O. Box 73309

Abu Dhabi, United Arab Emirates

Tel. +971 2 444 2503

Email: info@advancis.ae Web: https://advancis.net

www.assaabloy.com/ae/en patricia.lomboy@assaabloy.com

Magazine Topics

Man Guarding

Technical protection

• Video surveillance

• Access control

• Intrusion detection

• Item theft protection

• IP and network solutions

• Perimeter protection

• Fire detection

• Gas detection

Mechanical protection Cash/valuables-in-transit

Cyber security

Digital forensics

Software solutions

Smart home

Internet of things

Security management Investigations

Building management

Market research

Legislation and standards

12 – 14 January 2026

Dubai World Trade Centre

The world’s premier event for Security, Safety and Fire Protection.

50,000+

1,300 Exhibitors 61 Exhibiting Countries 140+ Visiting Countries Visitors

ENQUIRE TO EXHIBIT

Index of Advertisers

2 ADVANCED UK SEIhag@advancedco.com www.advancedco.com 3 ASSA ABLOY SWEDEN info@assaabloy.com www.assaabloy.com

5 BOSCH GERMANY Santosh.Kumar@in.bosch.com www.bosch-middleeast.com 7 ELATEC GERMANY info-rfid@elatec.com www.elatec-rfid.com

9 HID GLOBAL SWEDEN emea-orders@hidglobal.com www.hidglobal.com 15 IDIS UK sales_mena@idisglobal.com www.idisglobal.com 38 ID TECH BELGIUM info@idtech.eu www.idtech.be 88 INTELLIGENT SECURITY SYSTEMS USA sanjay@issivs.com www.issivs.com 39 JAVELIN TACTIX USA office@javelintactix.com www.javelintactix.com 13 LINEV SYSTEMS USA info@linevsystems.com www.linevsystems.com 29 SCREENCHECK NETHERLANDS enquiry.screenchecksaudi@centena.com www.screenchecksaudi.com

23 SUPREMA KOREA sales_me@supremainc.com www.supremainc.com

78 TABBARA ELECTRONICS UAE helpdesk@tabbara-electronics.com www.tabbara-electronics.com

51 TRAKA UK support@traka.com www.traka.com

11 TRASSIR INDIA welcome@trassir.com https://trassir.com

17 VELASEA USA sales@velasea.com www.velasea.com

63 XPR GROUP LUXEMBOURG marketing@xprgroup.com www.xprgroup.com

OTHER

79 GITEX UAE GitexSales@dwtc.com www.gitex.com

85 INTERSEC DUBAI UAE intersec@uae.messefrankfurt.com https://intersec.ae.messefrankfurt.com/dubai/ en/about.html

83 INTERSEC RIYADH SAUDI ARABIA Info@1starabia.sa www.intersec-ksa.ae.messefrankfurt.com/ksa/ en.html

37 MESTECH UAE marketing@asmideast.com www.asmideast.com

81 ISAF TÜRKIYE marmara@marmarafuar.com.tr https://www.marmarafuar.com.tr

59 SICUREZZA ITALY visitatori.sicurezza@fieramilano.it www.sicurezza.it

Magazine Topics

Man Guarding

Technical protection

• Video surveillance

• Access control

• Intrusion detection

• Item theft protection

• IP and network solutions

• Perimeter protection

• Fire detection

• Gas detection

Mechanical protection

Cash/valuables-in-transit

Cyber security

Digital forensics

Software solutions

Smart home

Internet of things

Security management

Investigations

Building management

Market research

Legislation and standards

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
a&s Middle East No.17 by a&s Adria Magazine - Issuu