Suprema - Experts & Thought Leaders

Latest Suprema news & announcements

Gallagher Security shines at Integrate 360 Durban event

Award-winning security manufacturer, Gallagher Security is reflecting on the success of its recent Integrate 360 event held in Durban, South Africa. Held at Premiere Splendid Inn Umhlanga, Durban on February 20, the event attracted 65 Channel Partners, End Users, and consultants from across KwaZulu-Natal and wider South Africa to showcase the latest in Gallagher’s innovative technology suite, discuss features and solutions ear marked for the future, and gain insights into the wider security industry, and key trends for the year ahead.  Latest innovations and integrations The event provided a total agenda, including learning sessions, displays, live demonstrations Gallagher was joined by a number of their pioneering Technology Partners including ATG Digital, CathexisVision, HID, RunRite Electronics, Stratus Technologies, Suprema, Traka/Assa Abloy, and Turnstar Systems who shared their latest innovations and integrations with Gallagher with attendees.    The event provided a comprehensive agenda including knowledge sessions, presentations, live demonstrations and valuable networking opportunities for attendees. Discussions on the future of the security industry Gallagher Security South Africa, Group Operating Officer, Morne Grobler says, “This year’s Integrate 360 event was another success and a highlight of our annual event’s calendar. We value every opportunity to come together with our Channel Partners, End Users, consultants, and members of the wider security industry to share insights, network and participate in meaningful discussions on the future of the security industry.”  He adds, “Investing the time to connect with our industry peers and build relationships is a powerful step towards strengthening our regional activity and continuing to unlock even greater value for our customers through the power of our people and our solutions.”

Suprema leads security transformation with AI solutions

Suprema, a pioneer in AI-powered biometric and security solutions, has been named ‘Strategic Partner of the Year’ at the SmartTech Asia Innovation Awards 2025, held in Mumbai, India on 13th Feb. The prestigious award, "Strategic Partner of the Year" highlights Suprema's excellence in Innovation & Impact, Strategic Leadership, Industry Influence, and Sustainability & Ethics. Advanced AI-driven solutions With over 20 years of experience in biometric authentication, Suprema delivers advanced AI-driven, contactless, and facial authentication-based access control solutions, ensuring robust security, seamless people management, and enhanced user convenience. Suprema is the only brand that has won this award in its domain. SmartTech Asia Innovation Awards 2025 is a leading event that showcases cutting-edge solutions in fields like AI, IoT, RFID, biometrics, digital payments, and smart card technologies. SmartTech Asia Innovation Awards At this year's event, 20 companies were recognized as award winners for their contributions The SmartTech Asia Innovation Awards recognize groundbreaking technologies and visionary pioneers that are significantly impacting and shaping the future of these industries. At this year's event, 20 companies were recognized as award winners for their contributions. “We are incredibly honoured to receive this prestigious award,” said Shreyans Vasa, Country Manager of Suprema India. Security-driven digital transformation Vasa added: “This recognition reaffirms our dedication to developing cutting-edge AI-driven security solutions that deliver exceptional value to our customers. Suprema has built a strong reputation for reliability and innovation in the Indian market and continues to lead the security-driven digital transformation for enterprises." "With India's access control market projected to triple over the next decade, Suprema is set for exponential growth, backed by its strong technologically advanced product portfolio.”

Integrate 360: Gallagher's latest security solutions

Award-winning global security manufacturer, Gallagher Security is gearing up to showcase the latest from its innovative technology suite at its annual Integrate 360 event in Durban next week. Bringing together Channel Partners, End Users, and consultants from across KwaZulu-Natal and wider South Africa, Gallagher’s Integrate 360 event offers attendees the chance to engage in knowledge sessions, presentations, live demonstrations, and valuable networking opportunities. Latest innovative security solutions Gallagher will be showcasing the latest in its innovative security and access solutions suite Gallagher will be showcasing the latest in its innovative security and access solutions suite and sharing more about their future products and features including the upcoming release of their award-winning site management platform, Command Centre.   Additionally, attendees will get to hear from some of Gallagher’s pioneering technology partners including, ATG Digital, CathexisVision, HID, RunRite Electronics, Stratus Technologies, Suprema, Traka/Assa Abloy, and Turnstar Systems. Gallagher’s latest solutions Gallagher Security South Africa, Group Operating Officer, Morne Grobler says, “Integrate 360 is a highlight on the annual events calendar, offering attendees an interactive and informative experience, and showcasing Gallagher’s latest solutions." "Whether you’re interested in engaging knowledge sessions equipped with industry insights, live demonstrations of the latest Gallagher solutions, presentations unveiling the latest cutting-edge products and success stories, or networking with industry pioneers and technology partners, Integrate is a valuable experience for security professionals from across South Africa.” Integrate 360 will be held on February 20th at Premier Splendid Inn Umhlanga, Durban. Registration is essential to secure the spot.

Insights & Opinions from thought leaders at Suprema

ACaaS — The future of access control systems

Software as a Service (SaaS) provides computer equipment, OS, and software customised to the user’s purposes as a service. Access control can work in the same way. If you work in the physical security industry, especially concerning access control, you have probably heard about the term ‘ACaaS’ recently. ACaaS is a combination of ‘access control’ and ‘SaaS’ (Software as a Service). From a semantic point of view, ACaaS means providing cloud-based access control software as SaaS. Access control software is changing with the trends Cloud systems are mainly classified as IaaS, PaaS, and SaaS. IaaS (Infrastructure as a Service) provides computing equipment and operational support from an external cloud-based service provider. Amazon’s AWS or Microsoft Azure falls under this category. According to their contracts, users can remotely control computing equipment, provided by AWS and Azure. PaaS (Platform as a Service) is the provision by an external service provider of an operating system (OS) and various frameworks required for application development. SaaS goes one step further, providing computing equipment, OS, and on-demand software services that can deliver value quickly. The emergence of SaaS — what are the advantages? Adopting SaaS enables them to receive software services, without having to install and manage by themselves If you are not a developer nor in the software development industry, then what you know as a ‘cloud service’ is probably SaaS. Companies in various industries traditionally build their own infrastructure and purchase expensive software to install on-premises. However, adopting SaaS enables them to receive software services, without having to install and manage by themselves, opting instead to pay a fixed monthly fee and access the software on the cloud. The best example is Salesforce.com, which offers customer relationship management (CRM) as SaaS, and Microsoft Office 365 and Google Workspace, which offer productivity tools as SaaS. Continuous growth of the SaaS market The SaaS market has been continuously growing since 2010. Salesforce.com recorded the largest market share with its CRM SaaS model. At the same time, Microsoft Office 365, a SaaS version of the traditional on-premises Microsoft Office, has surpassed its competition in the productivity software industry. So, what is driving the growth of the SaaS market? On the surface, SaaS is recognised as a means of saving CAPEX and OPEX. However, its actual cost-effectiveness might not be so significant, since the cost of SaaS-based services tends to increase in proportion to the number of users and period of use. SaaS-based services driven by quality of their features What most drives SaaS-based services is the quality of their features, as determined by user satisfaction. In contrast with the on-premises systems of the past, where improvements came too slowly, as people could only provide feedback via email or phone, SaaS allows companies to detect inconveniences directly from the system and quickly respond. Considering the advantages of providing rapid feedback and improvements, SaaS makes a big difference in terms of the quality of features and user satisfaction. SaaS-based cloud services can create new opportunities, by leveraging accumulated data Additionally, SaaS-based cloud services can create new opportunities, by leveraging accumulated data. Using AI-based analysis of data stored in the Cloud helps to provide unprecedented convenience to the market. The best example of this could be Salesforce.com’s Einstein service, which provides an analysis of customers' growth potential or risks. Adopting ACaaS for cyber security ACaaS tries to incorporate all of the above benefits associated with SaaS to access control software ACaaS tries to incorporate all of the above benefits associated with SaaS to access control software. However, the access control industry has been slow to adopt SaaS-based cloud services, when compared to other industries. This is because the life cycle of an access security system extends to around 10 years and many security managers still assume that internal services are safest and external services are unsafe. It is now becoming important to rethink whether it truly is the case that internal systems are safe and external ones are not. For example, consider ‘intranets’, private networks unconnected from external networks, common use until the early 2000s. Digital transformation and remote working We all gathered together in the same place to work in the past. But with the impact of the COVID-19 pandemic and subsequent digital transformation, working environments have changed in various ways and places. Importantly, it is now very uncommon to be cut off from the outside world with an intranet. Modern work and life require a connection to the internet for communication with others and working remotely. In this age where few truly private networks exist, the idea that external services are unsafe may be misguided. SaaS-based ACaaS services The question that matters most from a cyber security perspective is not whether the system is internal or not, but whether the system is really secure. There are many available administrative and technical solutions that secure systems, and many standards, such as ISMS and ISO27001 exist for safer system management. These solutions and standards make a system or service secure. SaaS-based ACaaS services comply with these standards, meaning your systems are protected by numerous experts and specialists. Of course, when selecting a solution, security managers should consider whether the ACaaS is designed for and certified by a standardised security framework. ACaaS — the future of access control systems ACaaS will improve quality, making it more convenient, safe and quickly responding to user feedback Access control software has long been regarded as a complicated matter by security managers. Although it is complex technology by nature, efforts to improve its convenience of usage have fallen short. For this reason, we should pay attention to SaaS, which increases usability. As many SaaS-based cloud services in other industries have shown, ACaaS will improve quality, making it more convenient, safe and quickly responding to user feedback. Furthermore, ACaaS will facilitate the development of safer and more convenient systems, by leveraging AI analysis of accumulated data. Enhanced safety and convenience For example, access control systems may add a feature to identify abnormal behaviours and movements, based on existing access and behavioural data, in order to predict and prevent possible incidents. Just as SaaS-based cloud services in other industries have adopted an unprecedented level of convenience with intelligent new features, ACaaS will also be able to increase convenience and safety for companies and users, with intelligent new features that could not be realised in previous times.

AI is transforming the security industry

We encounter AI with increasing frequency, both online and in the media. AI has penetrated deep into various aspects of our lives, from TV sets that improve picture quality using AI, or air conditioners with automatic temperature and humidity control, to investment management services that predict return rates. AI technology first appeared in the 1950s and was briefly revived in the 1980s before falling off the radar. In the late 2000s, AI re-emerged and went on to become a key technology and driver in the IT industry. In order to learn and adapt, AI technology required a large amount of data, which was difficult to collect in the pre-2000s. By the late 2000s, things began to change. Large quantities of data began accumulating on the cloud, propelled by the Internet, smart phones, and the emergence of cloud-based services. The emergence of the Internet of Things (IoT) accelerated data collection and has led to explosive growth in AI technology. Data collected through the IoT and smart phones were sent to cloud platforms and used for AI, leading to drastic industrial changes. These industrial changes have been dubbed the "Fourth Industrial Revolution", Industry 4.0. Physical security dilemma For the physical security industry, which handles access control and video surveillance via IT systems, security has always been accompanied by inconvenience and inefficiency. Greater security comes with a greater number of procedures that cause inconvenience and inefficiency for individuals partaking in them. The industry has traditionally opted to enhance security by making thousand of people go through additional steps in order to prevent one person from causing an issue. The challenge for companies and the security industry has long been striking a balance between security enhancement and efficiency. Future changing with Industry 4.0 Industry 4.0 is the key to solving the physical security dilemma. If we can allocate more resources to parts of organisations with higher security risks, or if we can recognise a sign of security error in advance and respond accordingly, then we will be able to enhance security without compromising convenience and efficiency. AI can be used to recognise irregular patterns and isolate parts with a high probability of security breach Smart operations such as these are possible when AI is trained against a large data source. If we can collect access and movement information through access records and the RTLS (Real-time Location System), and train the AI using the access and movement patterns of individuals, the AI can be used to recognise irregular patterns and isolate parts with a high probability of security breach. AI to access the movement patterns We can also use AI to study the access and movement patterns after security incidents occur. This means that further down the line if the same pattern should be detected, the AI can automatically take the appropriate actions to prevent the security breach. These are just some of the possibilities when AI is trained against accurate access, movement and location data, collected in the cloud from access control devices and RTLS devices. RTLS-based location tracking has already been commercialised. This technology is already being used to track patients in larger hospitals and for indoor navigation services in big shopping malls. In addition, access control, which core of the physical security industry, has already moved onto the cloud. The cloud-based access control market is showing a growth rate of 26.8%, three times that of the general access control market. Cloud-based access control service providers including Brivo and Kisi are leading this growth. An Industry 4.0 platform for the physical security industry is already emerging with data being collected for cloud storage and training AI. Inside Industry 4.0 Simply put, the industrial revolution is a change in the way we create exchangeable value, a change in the way we make money. AI trained on big data has already begun to surpass the limitations of human judgment. AI-based cloud service solutions now offer a new value that on-premise solutions based on human judgment simply cannot provide. Industry 4.0 for the physical security industry is still in its infancy, and that’s why the Suprema R&D team is developing cloud-based physical security services that are more convenient, efficient, and secure with the help of AI technology.

Facial recognition: Contactless solutions for a safe, post-pandemic world

Facial recognition technology has come a long way since it first came to market several years ago. Initially plagued with technical challenges and widely viewed as a futuristic solution, facial recognition is now firmly implanted in numerous consumer and business products and applications. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition, further expanding its use for an increasing number of applications. Facial recognition’s powerful identification and authentication capabilities make it ideal for two applications: first as a security tool, and second as a workforce management solution. The touchless, accurate credential solution Even before the COVID-19 pandemic, the touchless nature of facial recognition as an access credential was gaining traction with physical and cyber security professionals. Using an individual’s face as an access control credential eliminates the need for physical cards or PIN codes. Facial recognition readers meet the new emerging need to limit physical exposure to germs by offering a highly accurate touchless access control. Facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses As a workforce management tool, facial recognition helps preserve the health of employees checking into work, while providing management with an infallible means of documenting employee time and attendance while providing a detailed history of overall workforce activity and individual personnel tracking. Both of which have been longstanding challenges due to easily compromised time tracking systems and practices. Now, nothing is left to question based on hard data. Selecting the right solution for your specific access control and/or workforce management application is dependent on a very wide range of variables. But there are a few core characteristics that you should look for when evaluating facial recognition readers. Wide and near-angle LEDs Most facial recognition terminals employ some form of IR (Infrared) technology to help ensure high visibility by the unit’s image sensor. This often limits where the unit can be installed such as outdoors or near windows due to strong ambient light. More advanced facial recognition readers employ as many as 80 wide-angle near infrared LEDs and 60 narrow-angle near infrared LEDs, allowing the unit to recognise faces even in full daylight and brightly lit environments (not direct sun). This enables installation at indoor locations near windows, lobbies and building entries. 3D pixel intensity distribution analysis Another advancement to look for involves three-dimensional pixel intensity analysis. Ambient lighting contains ultraviolet rays which can negate near infrared LED lighting, and can also cast shadows making it difficult for a facial recognition reader to pinpoint the facial recognition points required for identification and authentication. Three-dimensional pixel intensity distribution analysis minimises the effects of ambient light when acquiring facial images by minimising lighting contrasts. As a result, it is easier for the algorithm to recognise the shape of the face, enabling it to extract more facial features and create higher quality face templates. Functional ergonomics The angle and position of a facial recognition reader directly impact the performance of the unit. Facial recognition readers with different viewing angles for built-in visual and infrared cameras allows users to stand at positions that are most suitable for facial recognition with little or no effort of contortions. This results in a faster, more comfortable, and convenient user experience. High performance processing The performance of a facial recognition solution is directly reliant on its processing power. New advanced facial recognition readers employ enhanced face template extraction technology and powerful processors. A 1.4 GHz quad-core processor can perform up to 3,000 facial database matches (1:N) within one second. More advanced solutions also feature Group Matching functionality capable of executing up to 30,000 matches in one second. Live face detection It is most important that the facial recognition readers you evaluate are capable of analysing faces in real time to maintain fluid entry/egress even during high volumes of employee traffic. Hardware-dependent live face detection systems employing technologies such as facial thermogram recognition and facial vein recognition require expensive hardware components, provide less accurate matches and slower authentication performance, which is counterintuitive for mainstream access control and workforce management applications. Dual authentication for added security Although the use of an advanced facial recognition reader provides the convenience, health benefits and cost-savings of touchless identification and authentication, there are many applications where more than one credential may be necessary to ensure the highest levels of security. Advanced facial recognition readers with multimodal, multifactor credentialing capabilities provide this added security benefit.  Videophone or intercom capabilities Facial recognition readers with multifunctionality can solve several challenges with one solution. A perfect example includes devices with SIP (session initiation protocol) videophone capabilities which effectively eliminate the need and associated expense of installing separate intercom devices while adding another layer of security to one’s facility. The COVID-19 pandemic and post-pandemic world have accelerated the need for highly accurate, cost-efficient, reliable facial recognition technologies. Selecting the right solution for your access control and/or workforce management is more important than ever before, making extra due diligence during the evaluation process a smart decision.

Quick poll
Which AI-powered capability will dominate in the years ahead?