Fingerprint Locks
Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch. This highly versatile self-locking, surface mount latch is designed for effortless installation on light-duty gates where traditional mortice latches are not an option. Codelocks’ new Surface Latch Jo Milne-Rowe, Managing Director at Codelocks said: “Protecting perimeters and outdoor areas is becoming a pressing concern for householders and busin...
Seamless connectivity between CLIQ Web Manager (CWM) and the braXos Steward platform gives organisations’ access management even greater security, flexibility and functionality. This innovative integration helps security managers work smarter, save time, and seamlessly extend the reach of their existing access system with wire-free CLIQ digital and electromechanical cylinders. CLIQ digital access with HR The CLIQ Connector feeds a secure bi-directional link between CWM and access system...
Camden Door Controls is pleased to bring to market a new CM-SRX2 wireless relay receiver with an ultra-compact weather resistant enclosure. This receiver offers high-security performance with rugged construction, a built-in antenna, and IP65 weather resistance for indoor or outdoor use. Supporting up to 30 transmitters, this compact relay receiver is only 2-1/2” x 3-3/4” x 2-1/4”, and is ideal for confined spaces. Two Form ‘A’ relay outputs (1A @ 30 VDC)...
Codelocks has appointed Nayem Momin as its new Area Sales Manager for the South of England. Nayem has over six years’ experience in and sales, including three years in the door hardware sector. He brings a wealth of experience in expanding customer bases and fostering long-term relationships. Codelocks’ customer base Notably, Nayem was previously responsible for the master key systems of the apartments in the redeveloped Battersea Power Station as well as push butt...
Schlage, a pioneer in home security solutions for over a century, introduces Advanced Rekey™, an innovative rekeying solution that offers builders and their professional partners efficient key management and a simple way for homeowners to maintain security as their homes evolve. Debuting at the 2025 International Builders' Show (IBS) in Las Vegas, Advanced Rekey is designed for ease of use, giving users greater control over home security with a seamless, do-it-yourself feature that makes...
Salto has launched the XS4 One S Keypad, a cutting-edge addition to the XS4 One product family and smart access ecosystem. This advanced smart locking hardware solution provides high-tech functionality. Its backlit, single-point, capacitive touch-enabled keypad guarantees intuitive operation, keyless access, and broad usability. It supports a wide range of credentials, including PIN codes, keycards, and mobile access. Users can expect robust, reliable access control that delivers unparalleled...
News
In 2025, access management can be a whole lot easier. By making access part of their digital processes, businesses can put time-consuming key management and the cost of changing the locks firmly behind them. Making this switch is a lot easier than many people think. Security and facilities managers everywhere are all too familiar with the drawbacks of outmoded access management workflows. Cumbersome keychains, lost keys, security staff tied to their desks, and mountains of manual key tracking. It can often be a time-consuming, repetitive daily task. eCLIQ digital key solution With eCLIQ, authorised users carry one key which unlocks every opening they need The eCLIQ digital key solution, part of the suite of Digital Access Solutions from ASSA ABLOY, transforms access management almost overnight. With eCLIQ, security managers replace multiple keys by issuing each keyholder with a single digital key which is programmed with personalised access permissions. With eCLIQ, authorised users carry one key which unlocks every opening they need. Operating eCLIQ is 100% familiar for anyone who has ever used a mechanical key. Security management systems Access and key administration, too, become simpler. Key cupboards, complicated spreadsheets and bulging ring-binders are a thing of the past. Instead, daily access management tasks are performed via intuitive, user-friendly software which can be integrated with existing business process and security management systems for additional time savings. Digitalising with eCLIQ A few clicks in the software, accessible securely from anywhere with a Web connection Digitalising with eCLIQ also saves money. If someone loses their key, or it’s stolen, there is no longer any need to change the locks and re-key. A few clicks in the software, accessible securely from anywhere with a Web connection, cancels the key’s access rights with no need to change cylinders anywhere in the building. Mobile workers can even update their access rights on-the-go, by making a secure Bluetooth connection between their key and smartphone. At almost any opening, make the access ready for what’s ahead The innovative eCLIQ solution provides an efficient, effective way to retrofit digital access control to almost every opening – doors, cabinets and more – in almost any location, inside or outside any type or size of building. It is quick and easy to make the switch. To install, simply change the existing mechanical cylinder for one of more than 60 different wire-free eCLIQ cylinder and padlock types. Standard eCLIQ keys Lock electronics are powered by the regular battery inside each key There is no need to drill new holes, replace the door or run wires. Lock electronics are powered by the regular battery inside each key; typical battery life for standard eCLIQ keys is 10 years. “For classrooms, offices, workshops, kitchens, studios, labs, treatment rooms, canteens, garages, gates, lifts, lockers, machines, medicine stores and many more spaces, customers of every size and type already rely on eCLIQ,” says Stephan Schulz, Product Manager at ASSA ABLOY Opening Solutions EMEIA. Straightforward management software The solution’s flexibility and straightforward management software ensure keyholders get access only to openings, and at times, which security managers choose. If workflows change, or when staff leave, access can be cancelled or amended instantly. There’s no hanging around for handover meetings; no more delays when running busy offices with multiple tenants and service providers. Solution’s flexibility to manage access The solution’s flexibility also helps manage access for temporary workers and contractors The solution’s flexibility also helps manage access for temporary workers and contractors. For example, multi-residential housing providers may grant cleaners specific access at dedicated times only. The software makes it simple to set their digital key to work at specific times and selected openings only. “Site managers all over the world already rely on this secure, proven digital solution,” adds Stephan Schulz. “Now, they never worry about missing keys or need to change the locks if someone loses theirs." Digitalising with eCLIQ Schulz added: "With just a couple of clicks in the intuitive management software, they trace every interaction between eCLIQ keys and locks at their site, or update mobile workers’ access by app.” “It all adds up to a big saving in the cost – and headaches – of manual security management. It is simple to switch and a breeze to use: our customers tell us that digitalising with eCLIQ makes a difference from Day One.”
Alfred International, a pioneer in smart lock solutions, is unveiling the new Interconnect Kit, an industry-first solution that enables any Alfred smart deadbolt to function as a code-compliant interconnect lock with single-motion egress functionality, ideal for both retrofit and new installs. With no comparable solution on the market, the Interconnect Kit instantly makes Alfred’s entire smart lock lineup viable in multi-family, single-family, rental, and commercial properties where locks with single-motion egress are a requirement, not an option. Alfred smart deadbolt Alfred eliminates this trade-off with an innovative solution that transforms any Alfred smart deadbolt Property managers have long faced a critical challenge: choosing between very limited smart access control options and fire code compliance. Now, Alfred eliminates this trade-off with an innovative solution that transforms any Alfred smart deadbolt into a code-compliant interconnect lock. Alfred’s smart locks This allows property owners to upgrade security without replacing entire lock systems while maintaining technological continuity across properties regardless of property type or regional building code requirements. The Interconnect Kit expands Alfred’s smart locks into a new market segment, giving property managers, landlords, and developers a future-proof, cost-effective way to integrate smart access control where it was previously impractical or with minimal viable options. A new market standard for interconnect locks Featuring multiple lever options, a sleek profile, and finishes that match Alfred’s smart locks Engineered to meet the rigorous demands of both commercial and residential applications, the kit is designed for quick and easy installation in standard prepped doors. Featuring multiple lever options, a sleek profile, and finishes that match Alfred’s smart locks, the Interconnect Kit is a first-of-its-kind accessory — a robust yet minimalist commercial-grade solution designed for modern security needs. Multi-family access control "The Interconnect Kit represents a breakthrough in multi-family access control," said Brad Cook, Head of Product Integration at Alfred International. "We're enabling property managers to modernise their access control without compromising on safety or breaking their budget. This innovation opens up smart access to millions of units that were previously limited by code requirements and extremely limited options." Key features of the Alfred Interconnect Kit Converts Any Alfred Smart Lock – Expands the capabilities of Alfred’s smart deadbolts to function as code-compliant interconnect locks with single-motion egress functionality. Built for Commercial and Residential Applications – Designed to withstand demanding environments, ensuring durability and reliability in multi-family, rental, and commercial properties. Future-Proof Smart Lock Solution – Designed to adapt as building codes evolve, eliminating the need for costly hardware replacements in the future. Seamless Integration for New and Retrofit Installations – Works with existing standard prepared doors or new installations, allowing for quick, hassle-free upgrades without major door modifications. Sleek & Customisable Design – Offers multiple lever options and finishes to match existing Alfred locks, ensuring a cohesive aesthetic across properties. Smart Home & Property Management Compatibility – Enables access to Alfred’s suite of products and flexible options like Z-Wave, Bluetooth, Wi-Fi, PIN Codes, RFID and integrations with leading automation platforms, enabling remote access and efficient tenant management. Dual-Access Functionality – Provides PIN codes, smartphone access, and traditional key control, ensuring both digital and mechanical security flexibility for property owners and residents. Alfred Interconnect Kit at ISC West 2025 Property managers and builders can experience the Alfred Interconnect Kit firsthand at IBS in Booth C8908. Alfred will also showcase the Interconnect Kit at ISC West 2025 in Booth 25136. Attendees are invited to meet with Alfred to understand how the Interconnect Kit can transform access control for modern multi-unit living.
Alfred International, a pioneer in smart lock technology and a subsidiary of GHT Door Hardware announces a new integration with Universal Remote Control (URC), a global pioneer in smart automation and control solutions. This partnership leverages the Z-Wave® protocol to deliver seamless connectivity between Alfred smart locks and URC’s Total Control® system, providing integrators and end users with advanced, unified access and security management. URC TRF-ZW10 The integration allows URC dealers to incorporate all Z-Wave-enabled Alfred smart locks into URC Total Control installations with ease by using URC software, offering homeowners streamlined control over access points as part of a holistic smart home or building automation system. The URC TRF-ZW10 acts as the central Z-Wave hub, allowing devices like Alfred’s smart locks to communicate with Total Control for automated locking, remote monitoring, and seamless scene integration. The result is an elevated experience that prioritises security, convenience, and peace of mind. Smart access and security “Connected, smart access and security are strategic priorities for URC, so our integration with Alfred smart locks, via Z-Wave protocol, is very important to our dealer community,” stated Lars Granoe, URC’s VP of Product. “We look to expand our relationship with Alfred to deliver simple, fast integration for our dealers and peace of mind for home and commercial building owners.” Simplicity and reliability This integration delivers a scalable solution for modern environments, offering enhanced security The collaboration emphasises simplicity and reliability, enabling seamless operation across residential and commercial spaces. By combining Alfred’s sleek, technologically advanced smart locks with URC’s robust automation platform, this integration delivers a scalable solution for modern environments, offering enhanced security and automation possibilities. ZWLR connectivity and wireless charging Alfred’s Z-Wave compatible smart locks, including the DB2S and ML2 models, provide a range of advanced features such as Z-Wave Long Range (ZWLR) connectivity and wireless charging capabilities. These locks integrate with the TRF-ZW10 gateway by using URC software, ensuring reliable communication and responsive control within the Total Control ecosystem. Innovative and connected living solutions “We’re excited to partner with URC to provide a best-in-class integration experience,” said Brad Cook, Head of Product Integration at Alfred International. “This collaboration reflects Alfred’s commitment to enabling secure, innovative, and connected living solutions through partnerships with industry leaders like URC, and we look forward to enabling deeper integrations with URC in the future.”
Codelocks is taking its free expert training on the road early in 2025, starting in Rugby, Warwickshire, on Thursday, 13th February. The training session is on Mastering Electronic Lock Installation for Timber Fire Doors and features the practical installation of Codelocks’ CL5010 Lock and FireKit in the Master Locksmith’s Association's superb training lab. Latest developments in CE Marking Attendees will also receive valuable updates on the latest developments in CE Marking and FireKits as well as insight into Codelocks’ Mechanical and Electronic Ranges. Codelocks ‘On the Road Locks' training has been running across the UK for over two years. The tailored, hands-on, practical troubleshooting sessions have been very well received by distributors, locksmiths and installers. Importance of installing electronic locks Michelle Saunders, Sales Manager, at Codelocks explains, “Our first On the Road Locks training of 2025 is a very timely session on the importance of installing electronic locks on timber fire doors. Fire safety is a major concern and it’s vital that electronic locks are installed correctly to protect people and prevent the spread of fire." "Our free training courses are always very popular, especially the practical sessions and the fact that our experts are on hand to answer any questions about Codelocks’ ranges.”
Codelocks has extended its CL5000 electronic lock range with new Do Not Disturb (DND) models. The new CL5000 DND electronic locks prevent interruptions and unwanted access to locations where controlled privacy is important for people’s comfort and confidence. The new CL5000 DND electronic locks are particularly suitable for private spaces such as meeting rooms, consulting rooms, toilets and changing rooms. Locks Do Not Disturb feature The locks Do Not Disturb feature is activated by pressing the red button on the inside of the lock The locks Do Not Disturb feature is activated by pressing the red button on the inside of the lock. When activated, only the Master and Sub-Master codes can unlock the door, ensuring no interruptions or unwanted access. If a standard User Code is entered, the lock’s LEDs will flash, an alert will beep, and the door will remain locked. To cancel DND functionality, the blue button is pressed, or the inside lever handle is turned. Operation and clear LED indication Jo Milne-Rowe, Managing Director at Codelocks, said: “Privacy and confidence have become key priorities for organisations controlling access to their varied spaces. The Do Not Disturb capability creates more confidence and comfort for people, with simple operation and clear LED indication of its status." "This makes it ideal for spaces where people may feel vulnerable to intrusion, such as changing rooms, toilets, physical therapy rooms, and prayer rooms. These are spaces where stress-free experiences are really important, and our CL5000 DND lock prevents people worrying about interruptions and awkward encounters, letting them focus on their well-being instead.” Codelocks NetCode® Technology The user receives a NetCode® via email or text for their set duration The CL5000 DND features Codelocks NetCode® Technology which allows the facility owner or manager to set a date and time-sensitive code remotely via the Codelocks Connect Portal. The user receives a NetCode® via email or text for their set duration. The two models within the range are the CL5010 DND Mortice Latch and the CL5020 DND Mortice Lock. Both are suitable for high-traffic areas, are supplied with CE marked latch or lock, and are available in brushed steel or solid black finishes. Codelocks’ CL5000 DND electronic lock The CL5000 DND can be fitted with a Codelocks FireKit to ensure compliance with 30 and 60-minute fire doors standards, and is tested in accordance with BS EN 1634-1 for even greater peace of mind. Easy to install and program, Codelocks’ CL5000 DND electronic lock generates up to 100,000 openings from 4 x AA batteries, with a low battery warning when batteries need replacing. If batteries fail before they can be replaced, access is gained with the Key Override only.
Alcatraz AI, a global provider of frictionless, AI-powered biometric access control solutions revolutionising security through facial authentication, announced the appointment of Patrick Merfert as the company’s next Vice President (VP) of Marketing. Rapidly growing market With over 15 years of experience as a technology startup marketing pioneer, venture capital investor, and strategy consultant, Merfert contributes a vast wealth of identity and security-based technology marketing knowledge to Alcatraz AI’s leadership team as the company positions itself at the forefront of the rapidly growing market. His expertise in digital identity and its transcension towards a digital-first approach aligns with Alcatraz AI’s commitment to delivering secure, frictionless, and privacy-preserving biometric authentication solutions. Work experience Merfert has garnered years of experience in demand generation, product marketing, and brand identity Merfert is a growth and execution-focused technology startup marketing pioneer who has operated across the full lifecycle of VC-funded startups, helping tech companies go to market, differentiate, and accelerate revenues. Having worked across several startups from pre-revenue to pre-IPO, Merfert has garnered years of experience in demand generation, product marketing, and brand identity, allowing him to thrive in dynamic environments and strategise effective marketing approaches. Education Merfert holds both an MBA and BBA from Northwestern University’s Kellogg School of Management and the University of Michigan’s Ross School of Business, respectively. As an undergraduate, Merfert gained early exposure to technology startups, which ignited a passion for working in tight-knit, dynamic environments. Pre-MBA, he spent his early career working as a venture capital associate, serving as an investor and advisor to early-stage healthcare and technology startups. Merfert's key roles During his time as a management consultant, Merfert played key roles in executive-level strategy and operational engagements for Fortune 500 companies across various industries and contributed to business development pursuits. Merfert later took on a marketing leadership role at Airside, where he was introduced to the identity and security space and experienced the power of digital identity authentication and access control first-hand. Role in Prove Identity Merfert joined Alcatraz AI most recently from Prove Identity, where he served as Vice President of Product Marketing. There, he led the product marketing team in positioning the global product portfolio, launching new products, enabling sales, and helping scale the company’s annual recurring revenue beyond $100M and a $1B+ valuation. He also played a pivotal role in developing the go-to-market framework to drive scalability and refining company and product messaging, earning the company multiple analyst awards. New responsibilities Merfert will direct and oversee the company’s marketing team, designing, implementing, and monitoring At Alcatraz AI, Merfert will direct and oversee the company’s marketing team, designing, implementing, and monitoring effective marketing strategies that align with the company’s business goals and drive overall revenue growth, market awareness, and competitive differentiation. Merfert will be integral in promoting product adoption, enhancing brand presence, and ensuring the company’s product offerings are both innovative and aligned with market demands. Tina's comment “The access control market is growing at a rapid pace, and Alcatraz AI is adapting to this growth by expanding our leadership team with strategic hires,” said Tina D’Agostin, CEO of Alcatraz AI. “We are thrilled to welcome Patrick as our new VP of Marketing. His impressive background in technology startups and deep industry marketing experience will be a driving force in helping us achieve our goal to further scale in the growing security space and continue to expand our roster of large enterprise customers.” Merfert's comment “I’m energised to be joining Alcatraz AI’s dynamic leadership team. I look forward to shaping the marketing strategy and pioneering a cross-functional team to drive growth as the company rides the wave of rapid market expansion,” said Merfert. “It’s an exciting opportunity to operate at the intersection of artificial intelligence and the identity and security market. I’m eager to shape a world-class marketing team that will maintain a strong emphasis on customers and end-users to ensure Alcatraz AI’s market-pioneering products continue delivering convenient, secure, and privacy-preserving access control experiences.”


Expert commentary
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
As part of ever-evolving technological advancements and the increase in digitisation, home security systems remain a vital piece of equipment for at least 39 million households in the U.S., and as many as 13 million more households may install new security systems in the next 12 months. Global home security market In addition, a recent study found that 60% of burglars are deterred from attempting a burglary when a home has a security system, looking for alternative targets that are easier. Another similar study found homes without security systems are 300% more likely to experience a burglary. It’s estimated the global home security market is expected to grow to $84.4 billion as more and more people install home security systems as a way to ensure their safety. High-tech security devices Home security systems and the technology behind them will continue to expand and integrate further With the ongoing need for home security systems and the introduction of technology such as Artificial Intelligence (AI), home security companies are finding new and innovative ways to improve the home security experience by installing high-tech security devices. These devices are changing how we protect our homes, valuables, families, pets, and more. As we look ahead to the future, home security systems and the technology behind them will continue to expand and integrate further within the home as AI evolves and takes on a more meaningful and deeper role in the home security industry. Features of AI-based home security systems Most home security systems already use AI regularly for features like smart cameras, motion sensors, and alarms. These offerings incorporate AI to detect and respond to potential security threats, differentiating between everyday activities and potential suspicious behaviour and then alerting homeowners based on the activity. As AI expands the capabilities of critical security features such as facial recognition, voice control connectivity, and enhanced video capabilities, it will significantly improve the traditional security systems we use today, providing additional means of not only protecting homes but also streamlining the overall home security system. Future advancements in AI home security systems Increased integration of security devices through AI As AI continues to evolve, we can expect to see increased integration and connectivity of devices included in a home security system and home – all powered by AI. This includes hardware such as cameras, motion detectors, keypads, sensors, and smart locks, as well as software, such as digital apps. This increased connectivity will not only make it easier for homeowners to manage their security system but also to customise their home and home security to meet their evolving needs. Voice control connectivity The new hands-free approach to home security enhances the user experience and opens up new possibilities Voice control connectivity is yet another key feature that is gaining popularity in AI-powered home security systems. Security system users can control and monitor their security systems using voice commands similar to how Amazon’s Alexa works, making security systems more convenient and user-friendly. The new hands-free approach to home security not only enhances the user experience but also opens up new possibilities for seamless integration with other smart home devices and mobile devices. AI will help personalise and individualise security settings Relying more heavily on facial recognition technology, AI algorithms integrated into home security systems will become more personalised and tailored to individual users based on their preferences. Imagine a security system that recognises each member of your family and adjusts its settings and alerts based on each user’s unique preferences and habits. Thanks to facial recognition improvements in recent years, this new level of customisation will enhance security and improve the ease of use, making home security more intuitive and user-friendly. By incorporating personalisation via AI into home security systems, simple tasks like disarming the system when returning home or arming the system before going to bed at night will be much more efficient, and security settings will be saved based on each user’s preferences. AI will analyse threats before they become emergencies AI-powered automation will play a heightened role in the future of home security systems as it learns to proactively analyse and respond to potential threats, security breaches, and emergencies like fires or carbon monoxide leaks. Through real-time monitoring, AI will begin to predict and prevent security breaches before they occur, working efficiently with human counterparts for an effective approach to security monitoring. Security monitoring AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level For example, through camera monitoring, AI will learn how to tell the difference between normal and suspicious activities, automatically adjusting your security settings and alerting you of a potential risk. Similarly, AI linked to a carbon monoxide detector may notice the levels rising before they reach a dangerous level and alert the security system user and monitoring service in advance. The AI evolution of home security The traditional idea of home security systems, with physical locks, keypads, and alarms, is rapidly changing into a more intelligent system powered by AI. Just as the cell phone industry revolutionised communication by making phones constantly accessible to us all, AI is on the cusp of transforming our home security systems into a much safer and more user-friendly experience. Shortly, we’ll see a world where every aspect of home security systems is easily accessible on one or multiple devices within the home or even on mobile devices, boosted by the help of AI. From keyless entry systems that recognise our faces to AI assistants that communicate with us and adjust settings based on our preferences, the possibilities are truly endless. A safer, smarter, and more secure future As AI continues to advance and becomes more integrated into home security systems and life in general, the future will bring enhanced safety, security, convenience, and peace of mind for homeowners. As we move towards a future where AI plays a larger role in our daily lives, we can expect to see a shift in the way we think about and approach home security systems – in fact, it’s already happening. The traditional security setup of the past is being replaced by a new era of intelligent, interconnected, and proactive home security systems that work seamlessly. With AI as our ally and incorporated into our home security systems, we can look forward to a safer, smarter, and more secure future for our communities, homes, and loved ones.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Security beat
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Case studies
Silverstein Properties, a pioneering real estate development, investment, and management firm, and its partners SwiftConnect, Allegion, and Kastle, announced they are live with resident keys in Apple Wallet for all apartment units at a multi-family housing location: Silverstein’s Silver Towers residential property at 606 West 42nd Street in New York City. Silverstein’s residential tenants now have an easy and secure way to add a resident key to Apple Wallet to access the apartment building and unlock their homes with a simple tap of an iPhone or Apple Watch—thus eliminating the need to use a traditional, physical key. Resident key in Apple Wallet The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry “We’re excited to make it easy for our residents to use their resident key in Apple Wallet to get into their buildings, homes, and common areas, which builds upon our previous offering to office tenants who use their employee badge in Apple Wallet to access offices and shared spaces including lounges, cafes, conference facilities, and yoga studios,” said Tal Kerret, President of Silverstein Properties. The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry, as property owners and employers reimagine the home and workplace experience for residents, office tenants, and employees. SwiftConnect’s success: Enhance security for residents “The Silver Towers project builds on SwiftConnect’s success in delivering seamless access via NFC wallets across the most iconic commercial real estate properties in New York and beyond,” said Matt Kopel, co-CEO and President of SwiftConnect. “We are excited to once again partner with Silverstein Properties and to extend our leadership into the multi-family housing market. Now, residents can easily access their personal spaces with their iPhone and Apple Watch, and property teams are able to enhance security for their residents—while also automating the process of managing keys and access.” Modern access-control solution SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials To provide residential tenants with this experience, SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials; and access control devices from Allegion™, as well as all other necessary business platforms and systems to create a unified digital network for hassle-free mobile access. “Kastle is thrilled to be a partner on the Silver Tower project, leveraging Kastle’s robust and proven access-control products to create a modern access-control solution that delivers an unparalleled experience both property owners and residents can trust,” said Haniel Lynn, CEO of Kastle. Schlage mobile-enabled wireless locks “We are excited to work with SwiftConnect and play an important role in Silver Tower's resident key in Apple Wallet multifamily housing deployment,” said Mark Casey, Vice President of National Electronic Sales of Allegion. “Resident Keys in Apple Wallet—alongside our Schlage mobile credentials and Schlage mobile-enabled wireless locks—not only enhances security and convenience for residents, but also exemplifies our commitment to driving the future of seamless access and smart apartment technology.” How seamless access works at Silver Towers Tenants can add their resident key to Apple Wallet after an initial set-up through Silverstein’s Inspire app, using SwiftConnect’s AccessCloud platform. Once added, tenants can hold their iPhone or Apple Watch near a door reader or smart lock for seamless access to the apartment building, their home, and shared fitness and amenity spaces. With Express Mode, tenants don’t need to wake or unlock their device to use their resident key—they can simply hold their device near a reader and go. If an iPhone needs to be charged, they can still use their device to access their apartment and amenity spaces with Power Reserve. Resident key in Apple Wallet takes full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when and where a resident uses a home key in Wallet. Silverstein’s holistic customer experience program The new offering falls under Inspire, Silverstein’s holistic customer experience program that reshapes how, when, and where the company’s customers live and work. Inspire brings hospitality services, social and wellness programming, data-driven workplace technology, and a flexible workspace solution under one umbrella. Since its inception 67 years ago, Silverstein Properties has been recognised for driving innovative technology adoption to enhance the tenant experience. The company has built a reputation for developing exceptional projects, enhancing local communities, providing outstanding services to customers and partners, and driving innovation within the industry.
As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio wireless locks Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Aperio visitor access system Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. A few clicks are all it takes to cancel a lost key card and issue a replacement. Real-time and future-proofed Security staff at The Camp ensure only authorised users enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because (access) rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto, adding “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Aperio product ecosystem’s performance Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery-powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl, adding “The whole world goes in and out. Security is very important.” Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It now attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Access rights management Digital devices and low-impact skills were needed to assure compliance with origin protection Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers – including up to 100 waiters working each shift – within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. Digital access for a famous heritage building Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly – simply by reprogramming cylinders – ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers, such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion – and encrypts data transfer between cylinder, key and system – so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager: “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. He adds, “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” New master key system With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime – future-proofing Hofbräuhaus access. “The situation before the new master key system was installed was problematic,” says Robert Graßl, adding “Keys were distributed and nobody knew who held them. Now, everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
In any construction project, meticulous recording and management of door hardware is critical —although often prone to human error. What if there was a way to harness digital technology to fulfil this crucial requirement in a dependable, efficient, agile way? Located in several cities around India, Edifice Consultants Pvt Ltd. specialises in designing climate-responsive architectural structures that harmonise with their surroundings. Complex standards and regulations Each project undertaken reflects Edifice’s collaborative ethos and dedication to enhance the immediate environment, while fostering the well-being of building users, local residents, and the landscape. Edifice’s work across commercial, residential, industrial and public service sectors has received multiple prestigious awards. Designing buildings for so many segments and industries requires broad and deep knowledge of complex standards and regulations. The experience and expertise of ASSA ABLOY have proved invaluable. Specification with Openings Studio™ ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors To streamline door specification, Edifice requires digital software that can cut manual mistakes and maintain the process’s accuracy, which is essential to efficient building design. Their chosen solution — Openings Studio™ — takes a rigorous approach, speeding up specification iterations to condense the revision cycle, improve time management and help hit Edifice’s ambitious project timelines. To date, ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors, via the Openings Studio plugin for Autodesk® Revit®. These include doors and door hardware suited to data centre deployment, among them mechanical mortise locks, exit devices, door closers and master-keying solutions from ASSA ABLOYs portfolio of trusted brands such as Yale and Sargent. Collaborating for transparency and project efficiency An industry-leading specification software tool and BIM plugin, Openings Studio integrates with design software to create and visualise openings for complete door, frame and hardware schedules and specifications. Its flexibility — and availability on multiple types of devices — means all specification changes are incorporated quickly and transparently, helping project delivery dates to remain on target. The Openings Studio environment also simplifies collaboration and data sharing among all project stakeholders. It helps manage openings over the full project lifecycle, from planning and estimation to installation and beyond. Door solution specifications Openings Studio maintains a unified digital thread that connects all project partners to eliminate confusion For these reasons, Openings Studio is deployed all over the world as a specification and ordering tool for building projects. It can deliver detailed door solution specifications directly to popular packages such as Revit® and ARCHICAD®, drawing on a detailed database with colour, size, thickness and certifications for every product; as well as installation and compliance information, Environmental Product Declarations (EPDs) and more. With ongoing use throughout a building’s lifetime, Openings Studio maintains a unified digital thread that connects all project partners to eliminate the confusion that comes with stakeholders having to juggle multiple versions of documents. Management of door hardware “Openings Studio has always been helpful in projects,” explains Gaurav Nirmalkar, Designer at Edifice. “Personally, I have used it in three of the data centres and it never disappoints. The simple and crisp interface is a plus point.” “Recording and management of door hardware is the most important thing in the construction industry. Openings Studio is a good choice for it.”
About 20 miles northeast of Battle Creek, Michigan, and 30 miles southwest of the state capital of Lansing lies the bucolic city of Olivet, population 1600. Olivet may be small as far as municipalities go, but it knows how to think big when it comes to protecting the safety of the 1250 students enrolled in its three Olivet Community Schools. Schools of Choice programme That may sound like a large student body for a town its size until they realise that the district serves a geographic area of over 100 square miles and communities that rely on an economy based primarily on farming, light industry, and the area’s two largest employers – the University of Olivet and the schools themselves. As a participant in the state’s Schools of Choice programme, the district can accept pupils from neighbouring areas, which make up roughly 33% of the Olivet Community Schools population in addition to the city’s resident students. John Mertz Mertz's career has progressed from teaching to roles such as Director of Instructional Services Guiding school operations is Superintendent John Mertz. With 33 years of public education experience in Michigan, his career has progressed from teaching to roles such as Director of Instructional Services, Assistant Superintendent, and now Superintendent. This is his fifth year in Olivet. “The interesting thing about being a school superintendent is that there are several things I didn’t know were going to come with the job and never received training on,” says Mertz. “And one of the biggest ones is school safety and security.” Video monitors He recalls a Saturday night when he was doing some work in his office while his daughter was attending a school event that evening. When he happened to look up at the large video monitors behind him displaying the schools’ camera feeds, he was surprised to see a lot of people coming and going during that hour. “I thought, who are all these people? Where are they going?” Mertz says when he looked a bit closer, he saw there were kids with backpacks and baseball bats who were all heading to the middle school gym, where they held practice. “I didn’t have any idea how they got in,” he says. “It turns out the coaches had a key that they used to unlock doors whenever they needed to after regular hours.” Unfortunate events He adds that it’s an unfortunate but common fact that many school districts have far more keys in circulation than have been officially issued. “It can be difficult to figure out where the keys are coming from." "Are they being shared, or copied? For me, that was a huge aha moment. I found myself saying we’ve got to do something about this; we’ve got to make sure we’re controlling who is getting into our buildings, for what purpose, and when.” Communication and transparency Mertz and the district to push for major improvements in the school’s safety and security system That’s what compelled Mertz and the district to push for major improvements in the school’s safety and security system. But Mertz says that before the district could even consider who to work with and what to purchase and install, his team had to make its case to the schools’ stakeholders – the staff members, the board of education, and parents. “The community needed to understand the rationale that warranted the upgrades. It’s all about communication and transparency.” Updating the access control systems “The biggest changes we identified meant replacing our outdated and often grainy security cameras with sharper, more advanced units and stepping up the capacity and capabilities of our access control system so we could better schedule and manage access at perimeter doors and for activity spaces." "But what was especially crucial was adding digital access control to our classrooms, which was a priority for further enhancing student and teacher safety.” Fiber connections and wireless networks Mertz adds that before deploying advanced cameras and access control, upgrades to fiber connections and wireless networks also had to be made. “So, we started reaching out to security system integrators and experts in access control like ASSA ABLOY to start figuring out what technology was out there that would be the most advantageous for our district. It was quite a journey.” Relationship, reliability, and response time Ultimately, Mertz says the district issued an RFP. “Along with assessing what we needed and increasing our knowledge of the solutions available, we were also concerned about the kind of partnerships we were going to form with the companies that would be awarded the upgrade project." "We talked about the importance of the relationship, reliability, and response time. We wanted companies that could continue to provide support and be accountable if issues arose after the project was done.” Three key solutions Olivet Community Schools ended up choosing PDT of Byron Centre, Michigan to be their systems integrator Upon completing their thorough vetting process, Olivet Community Schools ended up choosing People Driven Technology (PDT) of Byron Centre, Michigan to be their systems integrator. PDT Account Executive Charlie Booth explains that gaining a full understanding of Olivet Community Schools’ requirements helped narrow the decision to three key solutions and organisations. Integrating cameras, access control, and analytics “We brought Genetec™ in and did a demo of their Unified Security Solutions platform that integrates cameras, access control, and analytics to make everything work seamlessly together,” says Booth. At the same time, he started talking with ASSA ABLOY Integrated Solutions Specialist David Hood who then facilitated a demo of the SARGENT IN100 Aperio® Wireless Lock. SARGENT IN100 Aperio® Wireless Lock “We chose the Aperio line because the Olivet classroom doors always needed to be online and communicating with Genetec in case global actions were needed to secure doors, like in a lockdown,” explains Booth. “Having IN100 electronic access control locks at each door means the facilities department now just issues keycards to staff instead of brass keys, making it much easier to manage credentials. For the video surveillance upgrade, we specified state-of-the-art i-PRO cameras.” 24/7 door monitoring Superintendent Mertz says, “The integration of the new cameras and access control solution with the Genetec platform and AI analytics allows us to monitor door activity 24/7." "It gives us a keen understanding of who is in the building and when.” He says that along with ensuring only those with card credentials have access, the system also alerts staff if a door has an issue such as a card reader/lock battery that needs replacing. ZeroEyes AI gun detection Mertz adds, “We also incorporated weapons detection software. We received a grant from the state for ZeroEyes AI Gun Detection." "And in a partnership with the City of Olivet, we obtained a grant for our first school resource officer. None of this would have been possible without upgrading our infrastructure, cameras, access control technology, and analytics nor without the support of our school and community stakeholders.” Complement security features Technology features i-PRO cameras district-wide, over a hundred SARGENT IN100 Aperio wireless access control locks Olivet Community Schools’ complement of security technology features i-PRO cameras district-wide, over a hundred SARGENT IN100 Aperio wireless access control locks for classrooms, and the Genetec Security Centre unified platform. Christopher Dunn, Public Sector Account Executive for Genetec, further explains the value of his company’s solution, “One of the largest challenges Olivet faced was moving away from the fragmented system of the past where there was one platform for video and a separate one for the limited access control system they had." Human, vehicle, and threat detection "They needed to be able to harness the power of the technology at the edge that the new cameras offer and utilise it with applications that can detect things like the differences between human beings, vehicles, and potential threats.” He adds, “Because of how Genetec is structured and integrates so perfectly with other products, we’re able to bring everything into a ‘single pane of glass’, including analytics. That single pane of glass provides a dashboard that combines video and data feeds from multiple sources into a unified view.” Curb-to-core approach Dunn says that bringing everything together in one platform also eliminates the need for training on multiple systems, which was another highly important priority for Olivet Community Schools. According to David Hood, “ASSA ABLOY takes a curb-to-core approach when working with school districts, starting with the perimeter and then working inwards. Olivet Community Schools has followed that same approach. They have the perimeter protected with access control on every door along with video surveillance, and working inward to offices and classrooms, they now have integrated solutions throughout.” People Driven Technology Hood adds that collaborating with People Driven Technology and Genetec has been outstanding. “People Driven Technology understands our solutions and hardware, and they’re certified on our products." "That’s made installation and integration with i-PRO, Genetec, and analytics applications a seamless process for Olivet Community Schools.” An automatic classroom lockdown “It's all about student safety, staff safety, and community safety,” emphasises Mertz. “When you have people in your facilities, putting in these extra measures buys extra time." "So, heaven forbid, if there ever is an incident, you're prepared for it, ready to react, ready to swing into action with the systems in place that are going to help you do that, including activating an automatic classroom lockdown if necessary. Safe and secure building “When you look at success, it all comes back to the district and the kids. Now I determine success on whether our kids are safe. Are they happy? Are they healthy? Are they in an environment where they feel comfortable? That's really what it's all about now, especially coming out of COVID." "You need to have kids feel like they're in a place where there are trustworthy adults around them, where the building is safe and secure, and where they feel comfortable to learn.”


Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?
Products


Videos
Fingerprint Locks: Manufacturers & Suppliers

A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download