In Security Magazine October 2025

Page 1


Editor Chris Hewett editorial@mebmedia.co.uk

Accounts Jay Kempisty accounts@mebmedia.co.uk

Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk

Website and Circulation Manager Kevin Villa website@mebmedia.co.uk

Design and Production Charles David production@mebmedia.co.uk

In Security Magazine is published 6 times a year by

MEB Media Publishing Ltd 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, info@mebmedia.co.uk www.mebmedia.co.uk

Articles and art may not be reproduced or reprinted without the express written permission of the publisher.

Exclusion of Liability

Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

Copyright © MEB Media Publishing Ltd 2010 - 2025, all rights reserved.

4 Cover story - Unlocking the future

driving digital access in 2025 and beyond? A new report and survey dig deep 8 Product & Industry News

30 When every second counts Protecting employees in high-risk environments 34 Taking back control Empower individuals to control their biometric data 38 Connected thinking Why unified security systems are the future 42 The black box standard How digital incident records are becoming a moral and legal imperative for venues

Unlocking the future: WAC Report 2025

What’s driving digital access in 2025 and beyond? A new report and survey dig deep

The latest edition of the Wireless Access Control Report reveals a maturing market where digital and mobile solutions are becoming the norm. Alongside trends such as wireless adoption, sustainability, and cloud services, many adopters now target intelligent integrations and demonstrating ROI to cement the role of digital access in a new generation of smart, secure, efficient buildings.

Wireless access solutions are no longer outliers: adoption has climbed steadily – from 39% in 2023 to 42% in 2025, according to data from a survey for ASSA ABLOY’s 2025 report. These solutions are now integral

to access management strategies and workflows. They provide the flexibility needed for managing sites as diverse as schools, hospitals and manufacturing plants or mixed-use buildings, multi-residential housing, and agile workspaces. Adopters cite reduced wiring, easier retrofits, and integration-readiness as just a few of their advantages. Wireless is also popular in mobile-first environments, making it easier to support touchless entry, remote management, and real-time control.

Why do organizations continue to digitalize their access management functions? Mechanical key technology has been around for a long time. It is a proven, reliable, familiar technology

for securing homes and businesses. However, end-users and security professionals see significant rewards in access digitalization. The most important factor, according to ASSA ABLOY’s survey data, is convenience. When employees, contractors and temporary visitors can come-and-go with ease, operations for building and security managers are made more efficient, including cost-efficient. Digital access provides a concrete ROI – something that may be turned into a competitive advantage. In particular, digital access can help to tackle the “hidden costs” of workflow inefficiencies. Programmable digital keys eliminate any need for costly rekeying when someone loses

theirs, for example. Remote access management may reduce on-site headcount and overheads. Automated audit trails and access logs cut the cost of manual compliance checks.

Digital trends: mobile and biometrics Mobile digital access is no longer a novelty. Increasingly, it is an expectation. Adoption has boomed, as widely forecasted. ASSA ABLOY’s broad range of digital access systems incorporates several mobile solutions, including the Openow™ mobile app (for SMARTair® wireless locks), CLIQ® and eCLIQ Connect for mobile workforces, and the new ABLOY® CUMULUS mobile key platform.

Fully mobile credential environments are now in operation at 17% of all survey respondents’ organizations – more than triple the rate of 2023. The benefits of mobile are increasingly recognized by organizations across almost every sector and include more streamlined access management, with fewer physical credentials in circulation and the instant deactivation of any lost mobile key. This provides adopters with security peace of mind. Operational agility is enhanced when rights updates and other management functions can be done over-the-air from anywhere. As in so many other walks of life, mobile also offers a more convenient user experience. Interestingly, the number of respondents who rule out mobile altogether continues to shrink from edition to edition of the ASSA ABLOY report: just 19% of survey respondents now reject the idea of going mobile, down from 31% in 2023.

“Many early adopters have already transitioned: mobile digital access is for the now, not just something for the future,” says Richard Sharp, VP & Head of Product Unit Wireless Locks, DAS at ASSA ABLOY Opening Solutions EMEIA. “Where our 2023 report captured strong momentum towards mobile access, the 2025 edition finds increasing market maturity. As so many organizations modernize their security infrastructure, digital access systems are becoming standard, with a clear shift to mobile credentials.”

Biometric access is also emerging as a serious, scalable option in physical security, not just for sensitive facilities, but increasingly for general commercial settings, especially with the launch of powerful solutions like the iDFace reader from Control iD at accessible price-points. Survey data showed that a vast majority of professionals (91%) view biometrics as a useful access and authentication technology, with more than half of respondents (58%) already deploying it to some extent. With no risk from

lost credentials and a frictionless user experience, biometrics enable streamlined, secure access for staff, visitors and contractors.

Regulatory themes: sustainability and cyber/physical security performance

According to the International Energy Agency (IEA), buildings consume approximately 30% of global energy**. The 2025 ASSA ABLOY report confirms suggestions that, increasingly, end-users and security professionals are identifying concrete ways in which digital access can help to reduce unnecessary energy use. For many security managers, sustainability has gone beyond just a consideration: for 27% of survey respondents, it is the top factor when considering investments to enhance access management reach or capability.

“For many organizations, across multiple sectors, sustainability is moving from a supporting role to a strategic driver,” says Richard Sharp. “Wireless systems, which reduce the need for cabling and

complex infrastructure, are often seen as a ‘greener’ alternative. Battery-powered and energy harvesting devices like ABLOY PULSE generally consume much less energy than equivalent wired locks. We also see fast-growing demand for green building solutions and documentation, such as Environmental Performance Declarations (EPDs) which count towards several green certification schemes we support, including BREEAM, LEED, WELL and others.”

As ESG pressure and regulatory scope both grow, security procurement teams demand more transparency. The most authoritative way to gauge the environmental impact of a product over its life-cycle is with an EPD. An EPD offers a detailed map of its footprint from raw material, through manufacturing, logistics and impact during use, to end-of-life recycling. Thus, product-specific EPDs help architects, specifiers, contractors, developers, green building scheme assessors and housing providers to make accurate forecasts about both embodied carbon and finished building performance.

From 2026, construction products in Europe will integrate the results

from an EPD as part of the CE Marking process – and therefore, essential to sell a product or solution to the European market. Full implementation of the revised European Performance of Buildings Directive, from 2027, will enforce disclosure of carbon footprint of products via EPDs in the residential sector, too. From 2030, the same regulation requires all new-builds to declare total whole-life carbon, including embodied carbon. This mandate will most likely expand to apply to renovations from 2030 onwards.

Another fast-evolving regulatory picture concerns cyber and hybrid physical/cyber security performance. This is a major focus for those upgrading or updating an existing digital access solution. “With NIS2 coming into force and obligations under the EU’s Cyber Resilience Act fast approaching, this remains an area where customers and manufacturers must continue close cooperation,” says Richard Sharp. The vast majority of 2025 survey respondents (84%) felt their organization was either already compliant, or in the process of ensuring compliance, or that these regulations were not relevant to their

situation.

In providing commentary for the report, cyber-security governance expert Andy Watkin-Child of Veritas GRC noted: “Cyber security is quickly becoming a regulated risk for companies, either directly or indirectly, requiring boards to address cyber-security risk management or risk civil and/or criminal penalties.”

Cyber attacks must be viewed as a constantly moving target, and the recent mainstreaming of artificial intelligence (AI) only adds further to the mix. According to the UK’s National Cyber Security Centre, “Artificial intelligence (AI) will almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years”.*** An organization’s digital access solution must be ready for what’s ahead.

For more insights and data from the 2025 Wireless Access Control Report, download it for free at www.assaabloy.com/group/emeia/ campaigns/wac-report-2025.

*: technavio.com/report/biometric-accesscontrol-systems-market-industry-analysis **: www.iea.org/reports/buildings ***: www.ncsc.gov.uk/report/impact-of-ai-oncyber-threat

HIGH-END CAMERA

PERFORMANCE LENS X

THE NEW FUJINON SX800. THE BEST OF BOTH. With the new SX800, Fujinon combines both in one for the first time: camera and lens. For long range surveillance at the highest level with 40x optical magnification and constantly sharp images. www.fujifilm.eu/fujinon. Fujinon. To see more is to know more.

Comelit-PAC sets a new standard with LOGOS Wi-Fi launch

Comelit-PAC has launched a new LOGOS Wi-Fi monitor series to bring together practical design, intuitive installation and secure connectivity to meet the demands of smart residential and commercial buildings.

LOGOS Wi-Fi monitors offer a streamlined, intuitive setup process, with a simplified Wi-Fi and app pairing system to ensure a smoother user experience. A dedicated Wi-Fi button enables fast connection through the Comelit app, allowing users to stay connected to their home or building from anywhere, at any time.

For installers, programming is just as straightforward, with NFC technology enabling configuration via the MyComelit app, even when the monitor is turned off or still in its packaging.

Says Francesca Boeris, Managing Director ComelitPAC: “LOGOS Wi-Fi has been developed with installers and users equally in mind. From simplifying app association to enhancing security and sustainability, it’s a system that reflects how people use and live with door entry systems. It’s been a genuine collaborative process in so much as what you see in LOGOS Wi-Fi comes directly from listening to feedback across the industry,” Designed to integrate seamlessly with smart home systems like Alexa and Google Home, without compromising on security, LOGOs Wi-Fi Monitors are built on Comelit-PAC’s latest Baseline Security protocols.

The monitors use encrypted communication and WebRTC technology to protect audio and video streams.

This ensures personal data and access points remain secure, giving users confidence in both the convenience and safety of their connected systems.

The LOGOS Wi-Fi series is compatible with existing accessories and fits seamlessly into a wide range of environments, from individual homes to larger apartment complexes.

The interface has been refined to deliver a clearer, more accessible user experience, with features such as facial recognition, call forwarding to smartphones, internal intercom calling, and programmable functions like ‘do not disturb’ and concierge call. All wrapped in a durable, ergonomic design, the monitors are built to last and easy to use.

Francesca concluded: “LOGOS Wi-Fi reflects how we’ve listened carefully to the people who use and install our systems daily. From packaging to technical detail, it’s a result of thoughtful development where usability, security and design were treated with equal importance. Our goal is always to make security technology that fits naturally into life and works without complication. LOGOS Wi-Fi does exactly that, and we’re proud to bring it to market.”

With its energy-efficient performance and sustainable packaging, which include water-based inks and recyclable materials, LOGOS Wi-Fi reflects ComelitPAC’s ongoing commitment to reducing environmental impact across its product range.

IDIS highlights the increasing value of AI video technology for the retail sector

IDIS eBook details the latest retail video applications and explores changing buyer priorities

The latest generation of AI video solutions is significantly outperforming conventional security systems in retail applications, achieving faster returnon-investment and delivering notable new benefits, says IDIS in its latest market assessment.

While conventional surveillance systems are focused largely on security and targeted at loss prevention, the latest AI-powered video solutions are proving to be as attractive to retail sales directors, marketing departments, and heads of finance, says the Korean video technology leader.

The latest IDIS educational eBook, Designing compelling retail video solutions to increase efficiency and boost profits, explains that while the market is highly fragmented, making it potentially difficult for buyers to evaluate which AI solutions offer genuine value, systems integrators can offer compelling, value-driven solutions by learning from the recent wave of successful multi-branch and international retail projects.

Drawing on IDIS’s ongoing successes working with a wide range of retail businesses, including fashion and beauty branch retailers, franchises, luxury boutiques, and supermarket chains, the eBook shows how systems integrators can easily design and quickly install solutions that deliver multiple benefits, not just improving loss prevention but increasing operational efficiency and boosting profits.

Better yet, the new range of AI-enhanced video

solutions from edge cameras and AI boxes are not costly or complex to set up, and can now provide accurate answers to a wide range of intelligence questions that matter to retailers – including location footfall, customer capture rates and conversion rates, demographic data, dwell time, and data around seasonal and longer-term trends.

Accurate, reliable, and granular data is becoming essential for centralized retail management teams, which oversee multiple remote branches and need a clear picture of each location’s performance, says Koray Ozyildirim, IDIS Türkiye Country Manager and one of IDIS’s retail experts. Only with accurate information can these decision makers know where to open, close, or expand stores; what rents are realistic in each location; and how local store managers and staff are performing versus other locations, which enables centrally informed decisions to support each store or regional branches with the right stock, promotions, marketing, displays, and staffing levels.

“This new IDIS guide explains clearly how the latest AI video solutions are unlocking significant new value, what they are measuring, and what they are revealing,” Koray Ozyildirim adds. “Available to download for free, it is essential reading for any systems integrators working in today’s fast-moving retail space.”

Designing compelling retail video solutions to increase efficiency and boost profits can be downloaded for free here with a single click. To find out more about IDIS solutions, please visit www.idisglobal.com.

HID recognized among the UK’s Best Workplaces in Tech™ 2025, Certified by Great Place to Work®

The Company Achieved Strong Engagement Scores, including 95% of Staff Being Proud to Tell Others They Work at HID

HID, the global leader in trusted identity and authentication solutions, announces that it has been recognized as one of the UK’s Best Workplaces in Tech 2025 by Great Place to Work UK, a testament to the company’s leadership in the trusted identity and access control industry.

The award celebrates organisations that invest in their people to create exceptional employee experiences. HID has earned its place on the list following the results of an independent, anonymous survey of its UK employees.

The Great Place to Work® methodology is regarded as the global authority on workplace culture assessment. More than 10,000 companies across 97 countries take part, representing feedback from over 12 million employees worldwide.

To be awarded a place in the UK’s Best Workplaces in Tech listing, HID’s people were invited to share candid feedback on how their company supports their work-life balance, sense of fulfilment, job satisfaction, psychological safety and financial security and how consistently this is delivered across all departments and seniority levels.

“The tech industry is undergoing rapid transformation, driven by advances in AI and the constant pace of digital innovation. In a landscape where change is the norm, the UK’s Best Workplaces in Tech stand out for putting their people first,” explains Benedict Gautrey, Managing Director of Great Place to

Work® UK. “Investing in their culture, and leading with transparency, these organisations are creating stability and trust in uncertain times. Congratulations HID on building a truly great workplace and earning recognition as a UK’s Best Workplace in Tech.”

Employee experience at the core of HID’s business

The 2025 Trust Index™ survey showed HID achieving strong scores across engagement, leadership and values, with standout results including:

• 95% say they are proud to tell others they work at HID.

• 90%of employees reporting high levels of engagement.

• 90%of employees say they would recommend HID as a great place to work to friends and family

• 93% report they are given the resources and equipment to do their jobs.

• 91% express pride in making a difference through their work.

Strategic Focus on People and Growth

HID applied for certification to benchmark its workplace culture against the best in the UK and to strengthen its position in a highly competitive job market. The recognition comes at a pivotal time for HID as it expands recruitment across its UK sites, particularly within engineering.

Over recent years, HID has also invested significantly to expand its office workspaces as well as nurture strong partnerships with universities to develop future talent pipelines.

Paxton10 provides a single solution combining access control and video management. Easy to quote, install and use.

futureproof security for your buildings. The latest release of Paxton10 includes Lockdown and email notifications. Instantly secure the premises in the event of an emergency and recieve real-time notifications of alarms, access attempts, lockdown and more.

Videx launches new 7” handsfree video monitor with app and smart integration for 2 wire systems

Videx Security has introduced a new 7” handsfree video monitor that brings advanced functionality typically reserved for full IP systems to its popular 2 wire range.

The 6789 monitor, part of the 6700 series, is designed for use with the VX2300 system and 2 wire video kits including the new ERA23V range. It combines a high-resolution capacitive touchscreen with tactile programmable buttons, offering intuitive control, remote connectivity and smart integration features for residential, commercial and mixed-use applications.

As well as operating over the 2 wire bus, the 6789 includes built-in WiFi to enable remote access via the Videx CloudNected app. Users can receive calls, view entry panel cameras and unlock doors and gates from anywhere. The system also supports third-party CCTV integration via RTSP, and includes a web browser for remote management, event log access, and smart home control.

Rob Sands, Technical Director at Videx, said: “The 6789 represents a major step forward in 2 wire video systems. It brings together the usability of a modern touchscreen monitor with features such as remote access, third-party integration and smart heating control – all in one unit. It’s an ideal solution for both new installations and retrofit upgrades.”

Additional features include a thermostat and humidity sensor with programmable weekly schedules, smart intercommunication between monitors and the ability to adjust key settings via an internal web browser or IPure Wizard software. A desktop mount kit is also available for added installation flexibility.

The 6789 is compatible with other monitors on the VX2300 system and can be used to upgrade existing installations where more advanced features are required.

For more information visit www.videxuk.com.

Mayflex strengthens the external security team

Mayflex, the distributor of Converged IP Solutions, has strengthened its external security team with the addition of two new experienced and accomplished recruits.

Jason Cooke joins Mayflex from Wavestore where he was a Regional Sales Manager. Prior to that he has worked at Pelco as a Channel Account Manager. Jason will be focused on looking after accounts predominantly in the Southeast.

Matt McLernon joins Mayflex from Veracity UK where he was the UK Sales Manager. Prior to that he worked at Lilin UK as a Business Development Manager. Matt will be focused on looking after accounts in the Midlands and South Wales.

Francesco Bellavia, Director of Sales for Security at Mayflex, commented, “We are delighted to welcome Jason and Matt to the team, both have been in the security industry for many years and have a wealth of

experience, a focus on customer service and the desire to succeed, which is the perfect fit for our ‘driven to deliver more’ philosophy.

Frankie continued “They will be getting up to speed and then selling and supporting the full range of security products including Avigilon Unity, Avigilon Alta and, Axis, Hikvision, Milestone, Mobotix, Paxton, Pelco, Secure Logiq, Suprema and Veracity. Additionally, they will offer a full suite of infrastructure products from Excel to provide customers with a total installation solution.”

Frankie concluded “In the first few weeks Jason and Matt will undergo a comprehensive induction to bring them up to speed on the brands and all about Mayflex.

For further details on the full range of security products distributed, visit https://mayflex.com.

Bluetooth® programmable digital keys protect staff and fans at major German stadium

With a capacity of 66,500 spectators, the MERKUR SPIEL-ARENA is the largest multi-purpose venue in Düsseldorf and home to the city’s main football team, Fortuna. Regular and constantly changing major events, both matches and concerts, present an ever-evolving security and access challenge.

Stadium managers D.LIVE sought a secure, reliable replacement for their mechanical master key system; comprehensive, flexible security which would no longer create the problems and inconvenience of mechanical keys.

Another critical requirement was for robust devices which did not protrude from doors: football and music events can sometimes be a little rough. The technology installed needed to be tough and reliable enough to withstand the odd kick.

Finally, the solution would also need to simplify the management and rental of multiple private spaces inside the building including the Promenade, Merkur Business Club and boxes in the east wing. These offer additional space for a total of almost 7,000 people for meetings, press conferences or product presentations. One of the key requirements for the new system was therefore the ability to grant and revoke access authorisations individually, especially for external event organisers and operators.

Innovative key-based digital access

Based on these requirements and their experience with other local venues, D.LIVE chose the eCLIQ programmable-key locking solution, part of a suite of Digital Access Solutions from ASSA ABLOY, which scores highly on security, reliability and convenience. Their new eCLIQ key-operated digital access solution has approximately 2,500 wireless cylinders; around 1,150 programmable eCLIQ Connect keys have been

issued.

With this solution, every authorised keyholder carries their own eCLIQ key which can be programmed with tailored access authorisations. For added security, access rights can be individually revoked at any time and lost keys can be blocked.

Convenient management of contractor access “One of the reasons we chose eCLIQ Connect keys was to enable us to grant or revoke authorisations to external organisers and operators via Bluetooth in a rapid and user-friendly way,” says Lukas Angenendt, VEFK & Project Manager Electrical Engineering, D.LIVE.

Powerful, intuitive software makes it easy for stadium managers to issue temporary authorisations for contractors, cleaning staff and external event service providers, which streamlines site maintenance and management. As an additional layer of security, their eCLIQ Connect keys have to be validated on site by entering a PIN code in the smartphone app.

In addition to the digital security enhancements, eCLIQ’s high degree of flexibility was another big plus: eCLIQ is convenient to handle and program as, for example, the power supply and communication with each cylinder take place via the battery-powered key. There’s no need to visit every door or device to replace its battery.

No wiring is required for the very low-maintenance cylinder which is fitted flush to the door and thus offers no attack surface for vandalism. Cable-free installation was also simpler and quicker: only two weeks, when no events were taking place in the stadium, were available for the conversion of all doors.

To learn more about managing access digitally with eCLIQ, click here

Skills for Security opens new training centre in Doncaster

Skills for Security has opened its seventh dedicated training site nationwide. The new facility, based in Doncaster, South Yorkshire has welcomed its first fire and security apprentices on site.

The new centre has been fully renovated to create a modern and practical learning environment, with updated resources and facilities designed specifically for apprentices in the fire and security sector.

Purpose-built classrooms and workshop areas mirror real-world working conditions, giving learners the hands-on experience needed to progress quickly into the workforce.

David Scott, Managing Director of Skills for Security, said: “With seven centres now in place, we are better positioned to deliver high-quality training at scale, reaching more apprentices and employers across the UK. Establishing this centre creates new local opportunities for people to enter the industry and helps employers tackle the skills shortage head-on, providing the skilled workforce the sector urgently needs.”

This latest opening builds on Skills for Security’s growing national network, which already includes

centres in Warrington, Birmingham, Watford, Dagenham, Bristol and Glasgow.

By expanding its footprint into South Yorkshire, the organisation is strengthening regional access to training, reducing travel requirements for employers and learners, and boosting the sector’s overall training capacity.

The Doncaster centre has already started delivering programmes for apprentices at the beginning of their careers in fire and security, as well as supporting employers who are looking to upskill their workforce.

David concluded: “The launch comes at a critical time for the industry. The shortage of qualified engineers remains one of the most pressing challenges facing fire and security businesses, with demand for skilled professionals continuing to exceed supply. Addressing this skills gap is at the core of Skills for Security’s mission, with investment in new centres such as Doncaster and more to follow. We will continue to develop environments and programmes that ensure a sustainable pipeline of talent.”

Intelligent, wireless cabinet lock wins a prestigious design award

ASSA ABLOY’s latest solution for integrating cabinets and lockers with a digital access management system has earned top honors. The Aperio® KL100 Wireless Cabinet Lock has been presented with the Kings Excellence Award for Exemplary Product Design of the Year.

Despite a low-profile footprint, the Aperio KL100 adds powerful digital security to lockers, cabinets, cupboards, drawers and other small spaces. Because Aperio technology is designed from the ground up for native integration, with almost any system, it makes small openings an integral part of a digital access system. With the Aperio KL100, storage for valuables, documents or personal items benefits from the same convenient digital management as offices, labs or accommodation.

Designed for minimal disruption to furniture, its tiny footprint and battery-powered operation ensure quick, cable-free installation without causing damage or making a visual impact. The Aperio KL100 integrates seamlessly with any new or existing access control system – from over 130 different manufacturers and counting – to help reduce workplace theft and to give confidential documents the digital protection they require, especially important in an era of growing compliance demands on data access management.

The growing importance of product design for digital access hardware

As a security manufacturer, ASSA ABLOY has a long and

distinguished heritage of award-winning product design. ASSA ABLOY hardware has won multiple Red Dot and PLUS X Awards in Europe, for example. The Aperio H100, a door device with digital access technology inside its battery-powered handle, was named winner at EUIPO’s DesignEuropa Awards and the German Design Council’s Iconic Award: Innovative Interior.

“We are delighted to add the prestigious Kings Excellence Award to the many product design recognitions that ASSA ABLOY has received,” says Vishal Maheshwari, Director and Head of Digital and Access Solutions MEIIA Region at ASSA ABLOY Opening Solutions. “From the earliest stages of product development, our processes look at design holistically, considering not just security functionality and aesthetics but also usability, reliability, sustainability performance, ease of installation and maintenance, and much more. To be recognized for this by our industry peers is very rewarding.”

The Exemplary Product Design Award was presented at a ceremony during August’s Safe-Tech Conference in Mumbai, India*. At Safe-Tech’s annual conference, hundreds of security and fire safety professionals including government authorities, consultants, architects and senior safety officials gather to explore best practices, innovations, real-world case studies and practical applications in physical security, fire protection, disaster preparedness and process safety.

*: https://safetechawards.com/kings-excellence

IDIS Europe confirms Brian Lee as new Managing Director

Senior appointment announced as latest IDIS AI video surveillance advances aim to drive value and performance

IDIS Europe has confirmed the appointment of Brian Lee as its new Managing Director, as it drives the wider adoption of AI video surveillance technology with a focus on system performance and value.

Brian Lee was most recently Senior VP of Marketing & Sales Development for IDIS Americas, based in Dallas, and was instrumental in growing the North American and LATAM business.

He previously held a headquarters position as Head of the Global Strategy Team for the company, South Korea’s largest in-country video technology manufacturer.

Now heading up the IDIS Europe operation, he will continue to build on IDIS’s success in the region with an expanded sales team, a new focus on marketing and public relations strategy, and further development of IDIS’s network of integration partners in the UK and mainland Europe

Brian Lee says his appointment comes at a time of significant development for IDIS globally, including a series of recent video innovations powered by IDIS’s in-house developed next-generation deep learning engine, IDLA Pro

These include the Edge AI Plus cameras range, IDIS

A-Cut/AI search, and Smart Privacy Masks, all designed to drive value and efficiency, making it easier for more users to benefit from AI video surveillance.

“In recent months, IDIS AI-powered tech innovations have continued to make a powerful case for surveillance system upgrades, as well as supporting new users with easier real-time video search functions, more accurate live privacy masking, and more flexible, affordable adoption routes to reap the benefits of strengthened security and safety, and operational efficiency.

“As end-users in the UK and more widely look to upgrade their systems, including to ensure compliance with the Terrorism (Protection of Premises) Act 2025, our latest launches are designed to support more preventative and proactive security responses,” said Mr Lee.

He added that the latest launches build on IDIS’s commitment to provide customers with video solutions that are increasingly affordable, reliable, and effective.

Brian Lee also brings valuable experience to his new role from his background as a Director at LG Electronics and his master’s degree in business administration from Korea University, Seoul.

To learn more about IDIS solutions, please visit www.idisglobal.com.

MAN Commercial Protection

on the M&A charge as it sets sights on £100m revenue

The CEO of one of the UK’s leading independent security specialists has signalled his intentions to ramp up the firm’s M&A activity over the next twelve months.

MAN Commercial Protection’s Iain McCallister wants to make at least one acquisition and is currently working through a series of potential options thanks to its growing network of intermediaries and brokers.

Located at its HQ and dedicated training centre in Solihull, the company is ideally looking to purchase an established security business that boasts in the region of £5m to £30m in annual revenues and specialises in security guarding or systems.

It will be the first time the firm has gone down this route in its 32-year history and marks the next stage of its expansion and journey towards £100m turnover.

“2025 has been another strong year of organic growth, delivering tailored solutions for our corporate clients and high-profile events, such as the recordbreaking Oasis concerts - that was a real privilege to be involved in,” explained Iain McCallister.

“Revenues have passed £67m and we are justifiably proud of this performance, especially considering the volatile economic times we’ve faced. However, to move us forward at the pace we want, we are now turning our attention to acquisitions and we’re already having some interesting conversations.”

He continued: “We have been approached and are currently working with some influential brokers and I fully expect to have at least one deal over the line between now and this time in 2026.

“Our teams work all over the UK so there’s no barrier to geography. We’re more interested in finding the business that shares our values and desire to deliver the best safety solutions in the industry.”

MAN Commercial Protection, which employs nearly 1500 people, offers concierge, CCTV monitoring, security

guarding, systems solutions and keyholding services, as well as providing services to high profile boxing, sporting and music events.

The last year has seen it seal its first ‘security’ partnership with a football club in the form of National League team Solihull Moors, whilst it has also supported Solihull Summerfest and will be providing teams to Summerfest on the Beach, which will be held on the beach in Weston Super Mare next June.

It has also continued to invest in its training centre in Solihull and its growing list of courses that it provides for both industry professionals and corporate clients keen to get staff up to date with workplace first aid skills and Security Industry Association certifications.

Iain went on to add: “Any acquisition we make must complement our culture, which is family-focused, people-first. This is so important to us, and I want this to continue - so that’s one of the key pre-requisites of any transaction.

“There’s a lot happening in the world of security. New regulations, including Martyn’s Law (Terrorism Protection of Premises Act) and the proposed Cyber Security & Resilience Bill, will continue to have an impact and there is a shift towards cloud-based monitoring and remote operations, again requiring stronger cybersecurity.”

He concluded: “AI, like in most parts of the business world, will become even more prevalent. I’m sure we’ll see more use of Artificial Intelligence in video analytics, threat detection and predictive alerts. This is progress, but it can also be exploited by attackers. We’re investing heavily in overcoming these increasing cyber threats.”

For further information, please visit www.mancommercialprotection.co.uk.

More Than Access Control

Maxxess eFusion software opens up limitless possibilities, taking you beyond feature-rich, enterprise-level access control to give you all the benefits of a total security and safety management platform – without the cost or complexity.

Ready-made to integrate more than 60 leading technologies, off-the-shelf, Maxxess eFusion now lets you combine access, video, fire, intruder, visitor management, building systems, widely used databases and site-specific applications.

www.maxxess-efusion.com

Next-gen access control

How mobile, biometrics and AI are shaping the industry

As the world moves toward seamless, secure and sustainable entry solutions, Steven Commander, HID’s director of consultant business looks at how mobile access is being combined with biometrics and AI to transform the future of security.

A combination of evolving workplace dynamics, technology innovation and new user expectations are changing how people enter and interact with physical spaces and buildings. Access control is at the heart of these changes. When combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Whether in commercial real estate, higher education or corporate environments, these technologies are

integral to how organisations should approach security today.

Looking at the numbers

More than 60% of security professionals highlight mobile access as a top priority, according to the HID 2025 State of Security and Identity Report that summarises feedback from more than 1,800 survey participants (users, installers, integrators and original equipment manufacturers) worldwide.

The report also revealed growing demand for biometrics, with approximately 35% of those surveyed saying they are currently using this technology and 13% saying they plan to. The majority (73%) report biometrics as part of their multifactor authentication (MFA) strategy aimed at ensuring a multi-level approach to identity management for access to digital assets and critical

areas of facilities.

As for AI, the report shows that 64% of security leaders are using or planning to implement AI-powered solutions, citing benefits such as improved threat detection, operational efficiency and scalability. Among their many use cases, AI agents enable real-time anomaly detection, they automate routine tasks and facilitate seamless integration and scalability as security needs evolve.

Another theme of the HID report is the growing demand for seamlessly integrating access control with smart building technologies while improving scalability and delivering favorable business outcomes for the organisations. Organisations want easier ways to use physical access control data in their facilities for applications like flexible workspace management and building usage

monitoring. Perhaps more important, they want their buildings to provide occupants with the same easy access to their places and services that they experience elsewhere in their lives.

Fulfilling these and other objectives will increasingly require more unified security management in a more integrated technology landscape spanning mobile credentials, biometrics and more. It all starts with mobile access.

Mobile access provides a foundation Mobile credentials offer a convenient, secure way to access spaces—right from the smartphones people already use every day. This eliminates the need for physical cards or fobs and creates a streamlined experience across multiple use cases. These credentials also meet the expectations of employees and tenants who want seamless access experiences similar to what they can do with their phones for payments, travel, and communication. They want to unlock doors and authenticate identity with the same familiar tap.

Mobile access not only meets these expectations but also aligns with broader organisational goals, such as digital transformation and environmental responsibility.

For instance, while plastic keycards can be lost, cloned or stolen, mobile credentials offer enhanced security features such as biometric authentication, encrypted storage, and remote credential management. Furthermore, plastic cards tend to get lost, misplaced and destroyed more often than an individual’s mobile device which are looked after far better.

Mobile devices, particularly when integrated with cloud-based platforms, also allow administrators to issue, revoke or update credentials instantly—reducing vulnerabilities associated with lost or outdated cards. Additionally, real-time reporting and provisioning provide administrators with instant insights into access activities, enhancing security and compliance.

Sustainability is a growing priority and mobile access supports this by helping to reduce waste. By eliminating the need for plastic cards and shipping logistics, businesses

reduce their environmental footprint. Certifications like LEED, WiredScore, and GreenCircle further validate mobile access as a far more ecofriendly alternative to traditional access control systems.

Mobile access also improves operational efficiency through centralised identity management. It enables security teams and HR departments to simplify onboarding and access provisioning. Organisations with multiple locations can manage credentials remotely, eliminating the need to distribute physical cards. Beyond access, smart integrations with facility management systems can help optimise building efficiency, such as adjusting lighting or climate control based on occupancy. Real-time reporting capabilities allow organisations to monitor access trends, analyse occupancy data and make informed security decisions.

All these benefits of mobile access, and more, have become even more impactful with the rise of corporate apps and mobile wallets integrated with physical access control systems (PACS). This advancement makes it easier to realise the benefits of physical and digital security convergence which now extends to emerging access methods including biometrics and the use of AI for surveillance and facial recognition.

Benefits of biometrics and AI

Diversification of credentialing and the adoption of more innovative solutions are leading security teams to demand more options for identity and access control beyond passwords, cards or mobile credentials. One of the emerging trends is around biometric technologies or the use of automated technologies for authenticating and verifying human body characteristics, such as fingerprints, facial recognition or eye retinas/irises.

By automating identity verification, biometrics reduce the risks associated with traditional login or access credentials while enhancing convenience for users. As this technology continues to evolve, biometric solutions are poised to play an important role in shaping the future of identity and access management.

AI has an important role to play

here. An example in the healthcare industry is the integration of AI-driven surveillance and facial recognition technology which enables hospitals to track and manage individuals entering and moving within the facility. These systems can flag unauthorised individuals, monitor unusual behavior and assist security personnel in responding to potential breaches in real time.

Key AI benefits that were revealed in HID’s “Securing the Future of Healthcare” report include improved efficiency and speed (according to 50% of respondents), real-time data analysis (47%), reduced human error (45%) and proactive threat identification (37%).

Better building experiences

The transition to mobile credentials represents more than just a security upgrade—it’s a gateway to biometrics and AI and a significant step toward a smarter, more sustainable and efficient future. It is also a gateway to multiple unique use-cases that plastic credentials may not be able to fulfill. Mobile credentials take a significant leap toward delivering dramatically better building experiences— benefiting from tight integration between mobile access solutions and a building’s many physical and digital amenities, from cafeteria services to parking garages, lifts and a variety of digital assets and applications.

Achieving this requires the right balance between a building’s security and its user experience. This is achieved through the integration of modern hardware and digital overlays like mobile access, allowing for seamless access to amenities with a single credential across multiple buildings. Security can be dynamically adjusted, such as introducing stricter protocols after hours or the ability to remotely revoke a credential from a device in seconds.

Conversely, building security can be at odds with the user’s experience when outdated systems create silos, making it difficult for hardware and digital solutions to work together. This lack of interoperability can hinder both security and the user experience, leading to inefficiencies and frustration. Making everything work together requires scalable and

interoperable access solutions.

Mobile apps and/or mobile wallets integrated with PACS solutions have been an effective first step toward this goal. Now, the industry is beginning its next step, with a shift toward open and softwaredriven security platforms that unify management while supporting the growing range of integrated technologies that increasingly define a world-class building experience. A flexible, scalable approach is crucial for supporting evolving technology and design needs, ensuring both security and user satisfaction are maintained as the building adapts over time.

Mobile credentials are a futureready and essential component of modern security frameworks. Organisations that embrace mobile credentials now will have a foundation for adding biometrics and AI while making the transition to unified security management, such that ultimately they’ll be better positioned to adapt to evolving security needs, digital transformation and user expectations.

Case study

Mobile Access in Practice: University of Dundee transforms campus security using HID’s innovative access control solutions

When it comes to being future-ready, there is no better example than a university—filled with students who are digital natives and rarely leave their phones behind. The University of Dundee in Scotland exemplifies how mobile access technology is shaping modern security strategies in higher education.

Home to more than 16,000 students and 3,300 staff, the public research institution is recognised for its academic excellence in medicine, science, and engineering.

Challenge

The university needed a modern access control system that was both secure and user-friendly. Compliance with upcoming legislation, including Martyn’s Law—designed to enhance security measures in public spaces—was a key consideration. The institution also faced logistical challenges in issuing thousands of plastic RFID access cards annually, creating inefficiencies and increasing material waste.

Solution

To enhance security and efficiency, the university adopted HID® Mobile Access® with HID Signo™ readers across 40 buildings. This phased, two-year rollout was designed to provide a seamless transition from

traditional RFID cards to mobile credentials, allowing students and staff to use their smartphones for access.

The integration with AEOS access control software enabled centralised management, remote credential provisioning, and improved security monitoring. Additionally, security staff were equipped with Motorola smart radios configured to work with HID Mobile Access, further streamlining campus operations.

Benefits with future-ready results By shifting to mobile credentials, the University of Dundee has significantly reduced the time and cost associated with issuing physical cards while improving student and staff experiences. Pass issuance has been streamlined with instant credential delivery, saving 25,000 collective minutes for the Student Services department – equivalent to over 52-man days.

Mobile access is more sustainable, eliminating plastic card production and distribution. Moreover, the system’s flexibility will allow future expansion possibilities such as the integration with digital campus cards and smart building solutions, ensuring long-term value to the institution.

Futuristic monitoring turning cameras into thinking machines From CCTV to AI

The video surveillance market has evolved dramatically since its inception, transforming from rudimentary military observation systems into advanced, AI-driven monitoring networks that underpin modern cities, businesses, and homes. The origins of surveillance technology can be traced back to the 1940s, when the first closed-circuit television (CCTV) systems were developed for military operations during World War II. By

the late 1980s, video surveillance using videocassette recorders (VCRs) had become widespread in banks and public institutions. From these humble beginnings, the industry has transitioned into a multi-billion-dollar global market dominated by intelligent, connected, and data-driven systems.

According to ASIS International, by 2021, more than 770 million surveillance cameras had been installed worldwide — a figure that continues to rise as governments

and enterprises invest in smarter, safer environments. The market has become a lucrative arena for technology providers, integrators, and analytics firms, offering boundless potential for innovation and revenue generation. This article explores key sectors, applications, and emerging trends shaping the global video surveillance industry.

Public safety and law enforcement

Public safety remains one of the most prominent applications of video

surveillance. As urban populations surge and crime rates fluctuate, governments are increasingly relying on AI-powered surveillance networks to ensure security and order.

During the fiscal year 2023–2024, for instance, the city of London significantly expanded its CCTV network, allocating approximately USD 40.93 million toward public safety infrastructure. Similarly, West Haven in the United States invested USD 3.2 million in upgrading its surveillance capabilities, signaling a widespread commitment to adopting cutting-edge monitoring systems.

Modern surveillance solutions extend far beyond simple video recording. Today’s AI-driven cameras can detect unusual behaviors — such as aggressive speech, loitering, or crowd formation — and alert authorities in real time. Market leaders like WCCTV, Flock Safety, Avigilon, and Deep Sentinel are at the forefront of developing these intelligent surveillance solutions. By integrating machine learning and predictive analytics, these companies are transforming video feeds into actionable insights, enabling proactive rather than reactive responses.

The rapid proliferation of surveillance cameras in major metropolitan areas underscores the growing demand for integrated

public security systems. These installations not only deter crime but also assist law enforcement agencies with forensic investigations, crowd management, and emergency response coordination.

Traffic management

Traffic congestion represents one of the most pressing urban challenges of the 21st century. With vehicle ownership on the rise, cities are turning to intelligent video surveillance systems to alleviate gridlock, reduce carbon emissions, and improve road safety.

According to the International Energy Agency (IEA), transportation accounts for roughly 24% of global carbon dioxide emissions, with congestion being a major contributor. The U.S. Department of Energy estimates that more than 3 billion gallons of fuel are wasted annually due to idle vehicles stuck in traffic.

To address these challenges, governments are adopting AI-based traffic surveillance solutions that provide real-time monitoring, automatic violation detection, and data-driven urban planning insights. Cameras equipped with video analytics can track vehicle flow, detect traffic violations, and optimize signal timings — contributing to more efficient city infrastructure.

Global companies like Sensys

Gatso Group, Jenoptik AG, Verra Mobility, and SWARCO are spearheading smart traffic monitoring initiatives across continents. Their systems help municipalities manage congestion, enforce speed limits, and gather critical data for sustainable transport policies.

By integrating smart cameras into broader Internet of Things (IoT) ecosystems, cities are evolving into intelligent hubs capable of adaptive traffic control, predictive maintenance, and environmental monitoring — all powered by real-time data.

Healthcare and hospitals

The healthcare sector is another major adopter of advanced video surveillance technologies. Large institutions such as Massachusetts General Hospital (MGH) in the U.S. manage one of the most comprehensive integrated security systems, including photo ID management and advanced monitoring. Likewise, Houston Methodist Hospital (U.S.), Addenbrooke’s Hospital (UK), and Umrao Hospitals (India) have implemented high-definition IP cameras to protect patients, staff, and assets.

The rise of telehealth and remote diagnostics has also amplified the

need for robust video infrastructure. Hospitals are integrating surveillance with cloud platforms and access control systems to enable secure, remote management. As healthcare infrastructure expands globally, demand for networked cameras, encrypted video transmission, and long-term data storage is accelerating.

Video surveillance in healthcare not only enhances safety but also improves operational efficiency, helping administrators manage visitor flows, monitor restricted areas, and ensure compliance with health and safety regulations.

Residential areas

The residential sector has witnessed an explosion in surveillance adoption, driven by rising concerns over neighborhood safety and the growing popularity of smart home technologies. Manufacturers now offer an array of products, including IP cameras, dome cameras, pan-tiltzoom (PTZ) cameras, and smart AI cameras, all designed for home and community use.

According to the Observer Research Foundation, the number of home security cameras worldwide is projected to reach 180 million by 2027, reflecting rapid consumer

adoption. This surge presents immense opportunities for both established firms and emerging startups in the surveillance industry.

Beyond one-time hardware sales, many providers are embracing subscription-based business models, offering cloud storage, real-time mobile access, and AI analytics as recurring services.

Some of the major benefits of residential video surveillance include:

• Crime prevention and enhanced neighborhood security

• Access control and visitor management

• Monitoring of shared or public spaces

• Evidence collection and verification

• Remote monitoring and smart alerts

Such technologies are transforming the residential experience, allowing homeowners to oversee their property from anywhere while integrating with broader smart home ecosystems like Alexa, Google Home, and Apple HomeKit.

Conclusion and market outlook

The video surveillance industry is entering a transformative era shaped

by AI innovation, cloud computing, and IoT integration. Beyond security, cameras are evolving into “thinking machines” that can interpret visual data, detect anomalies, and provide predictive insights.

Emerging trends such as edge computing, encrypted data streams, and privacy-focused designs reflect the industry’s dual focus on security and ethics. As urbanization accelerates and digital infrastructure expands, the video surveillance market is expected to experience sustained growth, driven by public safety initiatives, smart city programs, and rising consumer awareness.

Ultimately, the fusion of technology, data analytics, and human oversight is redefining how societies approach safety, efficiency, and trust — turning ordinary cameras into intelligent guardians of the future.

For further information please visit https://www.researchnester.com/ reports/video-surveillance-securitycameras-market/100

When every second counts

Protecting employees in high-risk environments

For any business, ensuring the health and safety of its employees should be the number one priority – what is more, it’s a legal requirement. This is especially true when a company has employees that need to work alone. Whether it be in construction, healthcare or the public sector, lone workers face unique risks and challenges that those working in a team often don’t experience. Therefore, proactive steps must be taken to address them. By implementing clear safety

protocols and through using modern alarm systems, companies can greatly enhance the security and well-being of their lone workers. This not only safeguards the employees but also helps reduce potential liabilities for the company.

However, ensuring that lone workers have the right equipment and processes in place – such as a handset or device that is capable of triggering an alarm in the first place – is important to deploy to protect employees. Chris Potts, Marketing Director, ANT Telecom explains.

Triggering the alarm

Lone worker alarms offer a way of notifying people within an organisation that an incident to a lone worker has occurred and that support is required. However, to set off an alarm in the first place, workers must carry some form of handset or device that is capable of triggering alarms. There are many handsets that come in different sizes for employees to use: including wearable, dual-purpose, man-down, WiFi and those that don’t rely on 2G, 4G mobile networks. These

options must all be considered when deploying an effective solution –additionally, organisations must consider how response teams will manage each alarm too.

Light and sounder alarms

Light and Sounder Alarm alarms are great for anyone working in noisy or remote environments, where visual or audible alarms are the best way to capture attention.

They are commonly used on manufacturing sites alongside lone worker handsets or devices. When an incident takes place, a worker either presses their SOS button or their man-down feature on their lone worker handset. Typically, this activates and triggers the light and sounder alarm. However, while these alarms are great at making people aware of an incident, they do have their limitations. One of the biggest draw backs is the lack of information provided by the alarm. This is a problem if you have multiple lone workers on a site, as it doesn’t reveal who triggered the alarm or where the person is located. But, it does provide a general alarm for all to hear, see and respond to.

Therefore, to overcome this challenge, separate ‘sounders’ could

be installed for each lone worker with them clearly labelled. But, even with 10 or more lone workers the management of this could start to become more complicated and cluttered. Furthermore, if an incident occurred, it would mean that responders would have to walk to the sounder first to discover who triggered it, which is far from ideal.

When using this solution, its recommended that organisations implement a lone worker procedure and that they train workers on how to respond and manage this type of alarm – you certainly don’t want staff to stand and just watch when the alarm goes off.

PC desktop alarms

PC Desktop Alarms are an effective piece of kit for any business where safety, real-time communication, and rapid response to incidents are crucial. These alarms suit healthcare facilities where they have large teams of lone workers working in different sections of a hospital, or workers placed in large open plan offices. When triggered, PC Desktop Alarms provide important information to responders: including the lone worker’s name, telephone number and location, to help the

responder deal with the incident. Receiving the responses to these alarms typically takes place via control rooms and security areas, or in external Alarm Receiving Centres (ARCs) as these areas tend to be manned. However, this doesn’t always have to be the case. Large screens can be set up in other areas that workers operate in, such as open planned offices or in production areas where other people can receive and respond to alarms. In addition to this, alarm triggers can also be set up to be distributed to a group of Desktop Alarm responders as well as Handset Alarm responders to ensure alarms aren’t missed. This way all bases are covered.

Mobile handsets alarms

Mobile Handsets present another way for businesses to ensure the safety of their workers. When using this technology, recipients of a triggered alarm receive the alarm in the form of an SMS message or via an application on their smartphone (radios with screens can also receive alarms as can DECT handsets too). Typically the alarm message details the name of the person that triggered the alert, location and

telephone/handset number.

For many businesses, especially security firms or construction businesses, distributing alarm alerts directly to mobile handsets is a good way to deal with incidents, as mobile responders often also tend to be local to incidents and can manage each event from start to finish.

Responders also generally keep their mobile handsets with them at all times and therefore alerted instantly. However, since mobile responders often don’t work alongside one another, it’s wise to train staff on the protocol for managing an alert. Once an alert comes in, if they acknowledge it, they are the ones with the responsibility of dealing with the incident. This helps to avoid situations where either the whole group gets involved or no one does.

Multi-alarm combinations

Many organisations also make use of multi-alarm combinations to protect their lone workers. For instance, a light and sounder can warn responders within a production area of an incident. Responders can find further details by logging on and acknowledging the alarm on a nearby PC Workstation. Similarly, alarms presented on desktop screens as well as mobile handsets works well too. A member of the response team simply acknowledges the

alert to take ownership of the event, which updates the rest of his/her colleagues.

Managing alarms and audit trails

It’s important to remember that once an alarm has been triggered, it’s the beginning of the emergency, not the end. Therefore, for any business to looking to maximise the health and safety of their employees, it’s crucial to figure out how to respond to the event. To do this, organisations must consider who the best people are to alert and attend the scene – and, when they arrive, how will emergency medical support be requested and coordinated? So, what’s the triage process, and what are the next steps to resolution?

For example, if a maintenance worker was rendered unconscious on a manufacturing site, the best people to alert are probably the other maintenance workers as they know the site and the risks; and one day they could find themselves in the same position. But the emergency isn’t over once they’ve located their colleague. They will still need to contact the first aid team, perhaps emergency services. Paramedics will need help navigating to where the incident is etc. If this is all planned for in advance teams will have all the right tools and the response in emergency situations will be smooth: with no bottlenecks, fewer delays and

most importantly time will be saved – which could be life changing.

Lastly, it’s important to know how response teams deal with each alarm. So having an audit trail shows when each alarm has been triggered, when it was acknowledged and closed. All of which helps organisations improve processes over time for the business and staff.

Conclusion

Lone worker alarm systems play a crucial role in safeguarding employees within lone working scenarios, especially within high-risk environments. By integrating options like light and sound alarms, desktop alarms, or mobile handset alarms, organisations can ensure quick responses to emergencies. Each type of alarm system has its strengths. This ranges from alerting entire areas to an incident, to providing detailed information about situations as they occur. For effective use, companies must also train employees on responding to alarms and managing incidents. Multi-alarm combinations can offer additional protection too, and audit trails help improve processes in the long run for organisations and staff. Prioritising the safety of lone workers not only fulfills legal requirements but also helps prevent accidents, enhancing overall security and reducing company liabilities.

Increase safety on the factory floor?

Visit the Azena Application Store: the largest open platform for IP cameras. Offering groundbreaking software that runs on different models and integrates seamlessly with third party systems. Letting you benefit from AI video analytics – whether optimizing new cameras or retrofitting existing ones.

The range of ready-to-install apps extends beyond security and safety; adding value to operational intelligence, automation, or process control in such industries as healthcare, manufacturing, retail, transportation and tra ic.

Release the power of AI video solutions. www.azena.com

Start with a free trial Our free trial program is an easy way to test our solution with our support – no strings attached.

Taking back control Empower individuals to control their biometric data:

the new

challenge across all sectors by Thomas Decker, VP Product Marketing Finance at Linxens

What if your face, fingerprint, or iris was your greatest vulnerability in a cyberattack? All those parts of you that are most unique and private are now embedded in our devices, workplaces, and airports, promising seamless access and enhanced security. But there is a

dark side to this convenience: the fear of knowing where biometric data is stored and how it is used, and cybercriminals have seized on this. Attracted by these potential loopholes, they are questioning the security and integrity of our data storage. Trust in biometrics is being eroded as individuals worry that their sensitive information is being

stored in cloud environments that are vulnerable to breaches and misuse. To address these concerns, the future of biometric access security needs to drive action for change on an economy-wide scale.

Why the cloud is a concern

The rise of cloud-based systems has accelerated the adoption of

biometric solutions. By storing large amounts of data remotely, cloud platforms allow for scalability and easier system updates. However, high-profile data breaches and unauthorized access to personal information have fueled public skepticism. Deloitte’s 2023 ‘Customer data privacy and security’ survey found that 67% of consumers fear their biometric data could be misused if stored in the cloud, and this concern is particularly acute in regions with strict privacy laws, such as the European Union under the General Data Protection Regulation (GDPR).

Geopolitical tensions also increase the risks. Critical environments such as airports, military installations, and nuclear power plants cannot afford vulnerabilities in their access systems. In fact, they are a goldmine for hackers. They can intercept

valuable biometric data and commit serious crimes such as rigging elections, spying on hostile nations, usurping identities, or sabotaging sensitive systems and areas. These are irreversible actions with potentially dramatic consequences.

Moving to localized storage Biometric systems that prioritize edge computing offer a solution. Instead of sending data to the cloud, biometric information is processed and stored locally on secure devices or smart cards. These systems eliminate the need to transmit data over networks, dramatically reducing the risk of potential hacking.

For example, smart cards embedded with biometric data allow users to authenticate their identity without needing to interact with the cloud. This decentralized approach enhances privacy as the

data remains under the control of the user and is less likely to fall prey to cyber-attacks. It also complies with ethical and legal frameworks by giving users autonomy over their personal information.

Strategically securing high priority environments

Industries that handle sensitive materials or information - such as pharmaceuticals, energy, and defense - demand the highest levels of access security. Traditional access systems, such as swipe cards or PIN codes, are not enough to prevent unauthorized access. Biometrics offers a reliable alternative to the strategy adopted by these high-risk industries, but only if it is implemented without introducing new vulnerabilities.

Some organizations have already deployed on-premises biometric

solutions that process data in a closed environment, ensuring that sensitive information never leaves the facility. For example, nuclear power plants are increasingly using locally stored multimodal biometric systems (e.g. combining fingerprint and iris scans) to strengthen access controls. Similarly, the military and financial institutions are adopting innovative technologies such as the use of biometric smart cards: personal data is stored exclusively on the card itself, without recourse to the cloud or external servers. This not only reduces the risk of data leakage but also ensures strict compliance with the RGPD by guaranteeing secure, local management of personal data.

Challenges and the way forward Despite its benefits, localized biometric security faces challenges, especially as local devices must be robust enough to prevent tampering and cyber intrusions.

To overcome these hurdles, manufacturers are investing in advanced encryption techniques and tamper-resistant hardware. The use of biometric templates —mathematical representations of biometric data rather than raw images — also mitigates risks. These templates cannot be reverse engineered into the original data, further protecting users’ privacy.

Looking ahead, biometric systems will need to balance convenience, security, and ethical responsibility. By

moving away from cloud dependency, organizations can rebuild public trust while securing critical environments.

Eventually, to fully realize the potential of localized biometric systems, the industry must come together to establish standards and best practices. This is not just a technological shift but an ethical and strategic imperative to rebuild trust and safeguard critical environments.

The future of access security lies not in centralized technologies such as the cloud, but in empowering individuals to control their own data. The question is not whether industries can adapt to this ethical evolution, but how quickly they will embrace this shift.

Ulisse

Thermal

ULISSE EVO THERMAL is the new high-performance PTZ thermal camera with radiometry functions, designed to provide a preventative 24/7 video surveillance system in critical infrastructures, transport, traffic, railways and fire detection applications.

Connected thinking

Why unified security systems are the future by Cian Ó Cuinneagáin, Chief Technology and Product Officer at HALOS

Security teams today are operating in an increasingly volatile world. Threats are becoming more complex, regulatory demands are tightening, and the pace of technological change shows no signs of slowing. Against this backdrop, video footage has cemented its place as a critical asset, not only for investigating incidents but for ensuring compliance, managing operations, and maintaining public trust. Yet for all its benefits, video remains one of the most difficult assets to manage effectively.

The challenge lies in scale. With the rapid rise of body-worn cameras – now widely adopted

across sectors such as retail, hospitality, transport, policing and private security – organisations are generating more footage than ever before. While undeniably useful from a security perspective, this surge in video content demands a level of analysis and review that is difficult to maintain manually, especially at such a volume. When an incident occurs, security professionals are often left spending hours combing through footage to identify relevant moments. Hours that could be better spent responding to live threats or engaging in preventative work.

As the environments they operate in become more dynamic and fast-moving, security teams need

tools that can keep up. The traditional reliance on manual processes is no longer viable, especially when critical decisions must be made in real time.

The problem with fragmentation

One of the key obstacles to progress is the fragmented nature of many existing security systems. Video management tools are often deployed in isolation, disconnected from other key components like access control, alarms, or incident logs. This forces teams to move between multiple systems in order to construct an accurate timeline or piece together the full picture of an event or respond effectively to an active incident. The result is a process that’s not only

time-consuming but also prone to error, susceptible to delays and more likely to lead to critical oversights.

In critical scenarios, these siloes don’t just cause frustrations and slow teams down, they actively impair situational awareness. A lack of integration can lead to missed connections, blind spots in coverage, and delays in activating appropriate responses. And when incidents do occur, fragmented systems make it harder to retrieve relevant evidence or demonstrate compliance, potentially undermining internal accountability and public trust.

Why integration is essential Security teams need a more connected approach that streamlines responses, reduces errors and provides a clear, real-time picture of unfolding events. In the face

of mounting complexity, leading organisations are recognising that the future of effective security lies in interoperability. Rather than relying on a patchwork of standalone tools, they are building unified ecosystems and environments where video, sensors, access systems, and analytics platforms are seamlessly connected.

In these integrated environments, body-worn cameras become more than just recording devices. They act as real-time data sources, feeding footage directly into control centres and incident management platforms. This allows security teams to respond faster, more confidently, and with a clearer view of the situation on the ground.

For instance, live video streaming from wearable cameras can give command centres immediate

visibility into unfolding incidents. When combined with contextual information – such as access logs or motion sensor activations – the result is a far more accurate understanding of what’s happening and what response is required. This real-time intelligence is vital in high-risk environments like stadiums, airports, transport hubs or largescale events, where the difference between a calm resolution and a serious escalation can be measured in seconds.

Smarter coordination and safer teams

As well as enhanced visibility, integrated platforms also enable more effective coordination of resources. GPS-enabled tracking allows teams to identify the exact location of security personnel,

making it easier to dispatch the nearest responders or provide timely backup when needed. Features such as panic buttons, automatic incident alerts, and real-time messaging improve communication and boost team safety, especially in scenarios where threats evolve quickly or activities are spread across large areas.

Crucially, these systems aren’t just about response, they’re about prevention too. By unifying data from various sources, integrated security solutions give teams access to insights that can help predict patterns, flag anomalies, and fine-tune operations. The result is a shift from reactive to proactive security: a model where organisations are better positioned to anticipate risks and take early action to mitigate them.

A better way to manage evidence

Beyond incident response, integration also transforms how organisations

physically manage video evidence. Traditional methods of storing and retrieving footage are often slow, disjointed, and susceptible to data loss or tampering. But with a centralised, cloud-based platform, footage is stored securely and systematically, with automated tagging for time, location, personnel, and event context.

This makes it easier to retrieve and review specific footage and key moments within those recordings when needed – whether to investigate a complaint, defend against false claims, or support legal and insurance proceedings. With structured, visual evidence trails, compliance becomes simpler, investigations are resolved faster, and accountability is easier to demonstrate. This in turn fosters greater transparency with regulators, insurers, and the public.

Looking ahead: the strategic shift Ultimately, integrating security

systems is about more than just improving day-to-day operations. It’s a strategic decision that positions organisations to meet the demands of a changing world. As threats evolve and expectations rise, businesses can no longer afford to rely on siloed technologies and outdated processes. By embracing interoperable, unified platforms, security leaders are not only improving operational effectiveness, they’re laying the foundation for long-term resilience. These connected security systems enable smarter responses, safer teams, and stronger evidence management. But more than that, they enable a shift in mindset: from firefighting to foresight, from reaction to readiness.

Integration isn’t a nice-to-have. It’s the next natural step in the evolution of modern security – and those who take it, will be far better prepared for the challenges still to come.

Supercharge Your Cameras with Industry-Beating

IDIS is transforming video surveillance with an advanced choice of edge cameras, AI box devices, servers, and software ― innovations that make it easy to supercharge your operations without the burden of ongoing maintenance agreements or device connection costs.

Regardless of the size or type of your business, regardless of your operational priorities, IDIS makes it affordable to harness the power of AI video with solutions that give you optimized security and safety plus actionable business intelligence ― all with industry-beating accuracy.

And our expanding AI video range upholds the IDIS promise of plug-and-play installation, robust performance, and a low total cost of ownership.

The black box standard

How digital incident records are becoming a moral and legal imperative for venues

In the aviation industry, a black box is a non-negotiable. It records everything (the conversations, data, timings, decisions) and ultimately provides the only real chance of learning from a crisis. If an aeroplane took off without one, there would be public outcry. It’s a staple of public safety.

Yet every day across the UK, millions of people pass through the UK’s stadiums, arenas, transport hubs, retail complexes, campuses and community events that all

operate without their equivalent of a black box.

From one day to the next, these venues run smoothly. But when the unexpected does happen, control room operators can find themselves reacting on gut instinct and chasing fragments of information from spreadsheets, screenshots, email chains, WhatsApp threads, video clips and other disconnected logs of data.

With rising risk and the looming weight of new legislation, Lloyd

Major, CEO, Halo Solutions, says a digital black box for venues is becoming a moral and operational obligation.

Rising public safety concerns

Ten years ago, public safety concerns were dominated by high-profile terrorist plots. Today, terrorism remains a big concern, but it is layered with other threats. From unpredictable lone actors to mass crowd disorder caused by drones, climate stressors such as extreme

heat events, and social media-fuelled flash events that can cause sudden crowd surges, risk has become more erratic, diverse and harder to contain.

This evolution has brought a new level of scrutiny and regulatory pressure. The Terrorism (Protection of Premises) Act 2025, also known as Martyn’s Law, aims to enhance security measures to better prepare public venues for any kind of incident by introducing new requirements for risk assessments, planning and incident accountability.

These requirements are to be taken seriously. Venues and events that cannot demonstrate audit-ready records of their safety responses by 2027 risk enforcement action in the form of restrictions, fines and criminal penalties. But as it stands, more than 60% of UK venues and events still rely primarily on analogue systems, such as radios, spreadsheets, and manual logs to coordinate safety-critical operations,

which are leaving dangerous gaps in accountability and evidence.

The cost of not knowing

Most operators feel their current processes are ‘good enough’. In fact, in Halo’s pre-demo questionnaire, more than 70% of security and operations leaders rate their confidence above 3 out of 5 when asked if their logs could hold up under the evidentiary standards of a legal proceeding. However, in the same survey, nearly all admit to the same frustrations: difficulty ensuring accuracy, patchy audit trails, and the impossibility of building a complete timeline after the fact.

What’s missing is transparency

In the event of an incident, control rooms, safety advisory groups, and insurers all need to demonstrate not only that the right decisions were made, but that those decisions can be evidenced. And that’s no small task

when information is scattered across different devices and systems.

The financial impact of a failure is significant, with public liability claims already costing UK organisations more than £2.7 billion each year. And that’s only one part of the story. The other is the cost of public inquiries, which regularly run into tens of millions of pounds. Behind those figures are real people – attendees, operators and stewards who all suffer when something preventable happens or goes unrecorded.

Then there’s the cost of public confidence. High-profile public inquiries, such as the Manchester Arena Inquiry, have shown how the inability to demonstrate operational clarity causes trust to collapse. And rebuilding that trust can take years.

Under the latest regulations, organisations will need to demonstrate new proactive measures in ensuring public safety. To do so will require a clear, time-stamped,

protected record of operations in real time. In other words, a black box for venues.

Achieving a digital record of truth

Transitioning from analogue methods of capturing operational data towards a ‘black box’ style digital audit trail to meet new evidentiary standards will take measured, practical planning, which mustn’t overlook the following three considerations:

Assessment

Organisations should begin by evaluating current incident management and documentation processes. Using available tools, such as the Incident Response Curve Calculator, will help identify the biggest strengths and vulnerabilities in response patterns and pinpoint opportunities to enhance preparedness and resilience to build a clear business case for investment

Technology integration

An incident management system will be crucial, but the right one will go beyond simple logging. A comprehensive platform will enable live communications and centralised tasking to align teams under pressure; a tamperproof, time- and user-stamped log that can withstand legal and regulatory scrutiny; advanced reporting and analytics that can quickly turn raw activity into insight; and integrated modules that unify risk, incident, and compliance processes into a single source of truth.

Training and culture

Another major consideration is how to embed a culture of transparency and continuous improvement through regular training and awareness programmes. This isn’t about micromanaging teams; organisations don’t need to watch everything.

However, they do need to ensure that when key moments occur, they’re recorded, reviewed and remembered. The goal is to give teams clarity and confidence – a shared understanding of what’s happening, how to respond and how to carry those lessons forward.

Just as an aeroplane wouldn’t take off without a black box, it’s time that venues didn’t operate without one either. The evolving landscape of public safety and organisational accountability necessitates a shift towards a single source of truth – and this needs to arise through comprehensive incident documentation that not only ensures compliance but also fosters a culture of transparency, resilience, and continuous improvement.

For further information visit Halo Solutions www.halosolutions.com.

P R E P A R E D

F O R I P V O I C E ?

Mitigating risk, protecting your customers A call to installers

DIRECTORY

The ASSA ABLOY Group is the global leader in access solutions. Our offering covers products and services related to openings, such as locks, doors, gates and entrance automation solutions. This also includes expertise in controlling identities with keys, cards, tags, mobile and biometric identity verification systems.

www.assaabloy.com

azena accelerates the next generation of smart security and safety solutions through joint innovation with customers and partners. Our goal is to be the leading open platform and marketplace for smart security and safety solutions. The platform we offer is based on a camera operating system that powers cameras from various manufacturers on the market.

www.azena.com

Club Car boasts nearly 60 years of industry-leading innovation and design, initially focused on golf cars and then expanding to commercial utility vehicles and personal-use transportation.

www.clubcar.com

Innovating for a smarter, safer world by combining intelligent technology and human imagination, at Axis Communications we offer solutions based on sight, sound and analytics to improve security and optimize business performance.

www.axis.com

Buildings today don’t only provide a safe, functional place for people to live and work. They can also cater for – and even respond to – their needs, while helping them work more efficiently and sustainably. At Bosch Building Technologies, we are at the forefront of these new developments.

www.boschbuildingtechnologies.com

With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality.

www.fujifilm.eu/fujinon

Hanwha Techwin Europe, formerly Samsung Techwin Europe, offers robust and reliable video surveillance products designed to meet the current and future needs of security professionals. Our cameras, video recorders and other devices are built to exacting standards which reflect the heritage of precision engineering associated with the Samsung brand.

www.hanwha-security.eu

HID powers the trusted identities of the world’s people, places and things. We make it possible for people to transact safely, work productively, and travel freely. We are passionate about helping people use a verified, trusted identity to make it more convenient and safer for them to get to where they need to go and achieve what they want to do in everyday life.

www.hidglobal.com

Maxxess Systems delivers innovative SaaS and security management software solutions that combine otherwise disparate physical security, communications, business intelligence and data integration capabilities onto one unified management platform.

https://maxxess-systems.com

Panasonic i-PRO Sensing Solutions

Corporation of America a global leader in professional security solutions for surveillance and public safety, is launching their new name, i-PRO Americas Inc., and taking a unique approach to best navigate the evolving business environment and technology demands of the professional security industry.

https://i-pro.com/eu/en

As a trusted advisor and reliable partner, as a system integrator, service provider and a product vendor, Siemens offers energy-efficient, safe and secure buildings and infrastructure. With our people, our global footprint and our technical expertise, it's our passion helping you to create the perfect place – your perfect place.

www.siemens.com

Transforming teaching and learning with creative solutions to engage and inspire every student. Learning’s becoming more interactive. More immersive. More collaborative. At Sony we’re working with universities, colleges and schools to create richer, more rewarding educational experiences for today’s students and teaching staff.

https://pro.sony.com

At Mayflex we lead the way in the distribution of Converged IP Solutions. Bringing together ‘best-in-class’ Infrastructure, Networking and Electronic solutions. We’re a growing international force, enriched by the skills, expertise and unique personalities of our people. Globally owned but with a family and local feel.

www.mayflex.com

With over 30 years of experience, we design and manufacture marketleading security solutions for a range of buildings. Around 25,000 buildings each year are secured globally with Paxton products. Our global Head Office is based in Brighton, we have colleagues in 12 countries and we export to over 60 countries worldwide.

www.paxton-access.com

From its inception in 2001, SALTO was created with one objective: to devise a world-class access control system that was simple to use and extremely efficient, giving users the ability to control all their access needs and secure all their doors without complex and expensive wiring.

www.saltosystems.com

Videx Security is a leading manufacturer and supplier of access control systems across the UK. We are experts in the door entry market. Videx and our team of estimators, technical support and designers are focused on making and providing high quality products and support to customers.

www.videxuk.com

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.