Security Technology Archives - City Security Magazine https://citysecuritymagazine.com/category/security-technology/ News and advice for security professionals Thu, 18 Sep 2025 09:54:49 +0000 en-GB hourly 1 https://wordpress.org/?v=6.8.3 https://citysecuritymagazine.com/wp-content/uploads/2021/08/Logo-Square-300x300-1.jpg Security Technology Archives - City Security Magazine https://citysecuritymagazine.com/category/security-technology/ 32 32 The strategic evolution of mobile access control in UK security https://citysecuritymagazine.com/security-technology/the-strategic-evolution-of-mobile-access-control-in-uk-security/ Mon, 13 Oct 2025 03:45:00 +0000 https://citysecuritymagazine.com/?p=14643 The strategic evolution of mobile access control in UK security What are the implications…

The post The strategic evolution of mobile access control in UK security appeared first on City Security Magazine.

]]>
The strategic evolution of mobile access control in UK security

What are the implications of the move from plastic keycards to phone-based access control systems? Is this just a technological upgrade or a more significant change in how organisations approach security?

The UK security landscape is experiencing a fundamental transformation as organisations increasingly abandon traditional plastic keycards in favour of smartphone-based access control systems.

This shift is particularly evident in the commercial real estate sector, where mobile access control solutions offer greater intelligence, flexibility, and convenience, whilst delivering enhanced security. Rather than simply being a technological upgrade, this represents a strategic evolution in how UK businesses approach security infrastructure.

The security risks with plastic access cards

Traditional plastic access cards present significant security risks that mobile solutions effectively mitigate. Unlike our phones, which have become essential personal items, access cards are frequently treated as disposable afterthoughts – easily lost, forgotten, or carelessly shared with colleagues. Consider the everyday reality: most people instinctively check their smartphone dozens of times daily and feel genuinely anxious when separated from it, yet that same plastic access badge often gets forgotten in yesterday’s jacket pocket or left behind on the kitchen counter.

When physical cards go missing, the security implications extend far beyond inconvenience. Lost credentials create immediate vulnerabilities, requiring emergency lockouts, temporary access arrangements, and urgent replacement procedures. Meanwhile, the missing card could potentially be exploited by unauthorised individuals for days or weeks before the loss is even reported.

The benefits of mobile credentials

Mobile credentials eliminate these risks entirely. When access control is integrated into the device people already guard most carefully – their smartphone – the likelihood of credential loss drops dramatically. The embedded security features within smartphones themselves, such as biometric authentication, encrypted storage, and real-time credential management, provide additional protection layers that plastic cards simply cannot match.

When a mobile device is compromised or lost, administrators can instantly revoke or update credentials remotely through cloud-based platforms. This capability provides immediate response to security incidents, contrasting sharply with the delays inherent in traditional card replacement processes.

The technology operates through two primary communication standards that ensure broad compatibility and security. Bluetooth Low Energy (BLE) offers flexible interaction ranges, whilst Near-Field Communication (NFC) provides secure close-proximity authentication similar to contactless payment systems. Both standards support iOS and Android devices, ensuring comprehensive compatibility across diverse organisational environments. Today, most modern systems also support digital wallets, further integrating access control into users’ daily digital routines.

Operational benefits drive adoption

The operational advantages of mobile access extend well beyond security enhancement. Centralised identity management simplifies onboarding procedures and access provisioning, particularly valuable for organisations with multiple locations. Security teams can manage credentials remotely, eliminating physical card distribution logistics and associated costs. Real-time reporting capabilities enable comprehensive monitoring of access activities, providing valuable insights for security audits and compliance requirements. This data-driven approach allows organisations and building managers to analyse occupancy patterns, optimise security protocols, and make informed strategic decisions.

Environmental considerations

With sustainability increasingly influencing UK business decisions, mobile access helps them to significantly reduce their environmental footprint, as it eliminates plastic card production and distribution. This aligns with green certification requirements including LEED and BREEAM, and other environmental standards increasingly valued by UK property owners and tenants. The subscription-based model of mobile credentials, whilst representing a shift from one-time card costs, often proves more cost-effective when considering the total cost of ownership, including card replacement, shipping, and administrative overheads.

Successful mobile access deployment requires careful planning and stakeholder alignment. Unlike traditional access control decisions typically handled by single departments, mobile access necessitates collaboration across IT, security, HR, and facilities management teams.

Organisations must evaluate whether existing access readers support mobile credentials or require upgrades, as some legacy systems may need replacement to accommodate new technologies. Understanding workforce device preferences – whether iOS, Android, or mixed environments – influences implementation strategy and user adoption rates.

Integration requirements present another critical consideration. Seamless integration with existing security systems, HR platforms, and building management systems ensures optimal functionality and user experience. Mobile access systems must also meet relevant UK regulations and industry standards, including data protection requirements under UK GDPR and sector-specific compliance mandates.

The future landscape

Mobile access control represents a critical component of modern security frameworks. According to the 2025 State of Security and Identity Report, 37% of organisations are already implementing mobile credentials, with another 32% planning deployment. The technology’s alignment with digital transformation initiatives, sustainability goals, and user expectations positions it as an essential element of future-ready security strategies.

Advanced features such as identity positioning are transforming the sector by providing anonymised real-time occupancy data. This evolution transforms access control from purely security-focused systems to comprehensive building intelligence platforms, enabling integration with HVAC systems, workplace applications, and space optimisation tools. Such capabilities allow facilities managers to automatically adjust lighting and climate control based on real-time occupancy data, creating smarter, more efficient buildings.

UK organisations considering mobile access should adopt a strategic approach encompassing comprehensive stakeholder consultation, infrastructure assessment, and phased implementation planning. Success requires selecting experienced technology partners offering proven expertise, future-proof solutions, and comprehensive support capabilities.

The transition to mobile credentials represents more than technological advancement – it signifies a fundamental shift towards smarter, more sustainable, and efficient security infrastructure.

Organisations embracing mobile access now will be better positioned to adapt to evolving security requirements, regulatory changes, and user expectations in the increasingly digital landscape transforming the region. As workplace dynamics continue to evolve and security threats become more sophisticated, mobile access control offers the flexibility and intelligence needed to maintain robust security whilst supporting modern business operations.

Jaroslav Barton

Regional Product Marketing Manager

PACS Europe,

HID Global

www.hidglobal.com

The post The strategic evolution of mobile access control in UK security appeared first on City Security Magazine.

]]>
From reactive to proactive: how data intelligence is reshaping UK security operations https://citysecuritymagazine.com/security-technology/from-reactive-to-proactive-how-data-intelligence-is-reshaping-uk-security-operations/ Wed, 17 Sep 2025 08:58:16 +0000 https://citysecuritymagazine.com/?p=14589 From reactive to proactive: how data intelligence is reshaping UK security operations Security operations…

The post From reactive to proactive: how data intelligence is reshaping UK security operations appeared first on City Security Magazine.

]]>
From reactive to proactive: how data intelligence is reshaping UK security operations

Security operations have a data problem, but it’s not what you think. You’re already collecting massive amounts of operational data through workforce management systems and ERP platforms – guard movements, client interactions, scheduling details, performance metrics. The problem is getting useful answers out of it.

Think about it like this. You don’t want to wait until quarter-end to know which contracts ran over budget. You want to know about what budgets ran over last week. Or, better yet, you want to know which contracts are in danger of going over budget before they do. If you’re using a sophisticated workforce and contract management software, then your systems already have all the data needed to answer these questions – the problem is aggregating the data in the ways that can get you the answers fast. Meanwhile, your teams are operating under the same onslaught of challenges: last minute absence management, contract gaps, employee churn and administrative overhead.

What putting your data to work looks like

Analytics platforms change how you use information you already have by addressing fundamental operational questions that drain management time and profitability. Consider the possibilities within scheduling alone, where advanced data analytics can make a tangible difference:

  • Schedule stability: Instead of wondering why certain shifts consistently require last-minute coverage, you will identify patterns in unfilled positions within master schedule templates and track what percentage of adjustments happen within 24 hours of shift start. This visibility helps operations managers understand whether scheduling problems stem from template design or execution issues.
  • Resource utilisation: Data analysis reveals how effectively you’re using different resource pools – subcontractors versus salaried employees, assigned teams versus flexible coverage. Historical patterns will show which sites consistently require overtime coverage and whether you’re deploying the right mix of personnel types for different contract requirements.
  • Predictive possibilities: Analytics may identify employees most likely to drop shifts within 24 hours of start time based on historical patterns, letting managers proactively plan backup coverage. A simple query like “Who is at highest risk to not show up for their shift?” could return employee names with their percentage of last-minute cancellations, enabling targeted scheduling decisions.
  • Reconciliation accuracy: Supervisors may quickly identify discrepancies between scheduled coverage and actual time records, ensuring accurate billing and payroll while catching potential compliance issues before they affect client relationships.

In these examples, real-time monitoring replaces monthly surprises through budget tracking that shows contract performance daily rather than at month-end, while alert systems flag problems immediately – missed checks, unusual activity, overtime costs climbing beyond targets.

A foundational step of making this future a reality for your business is ensuring you’re operating from a clean and curated data warehouse; one that supports a true single-source-of-truth database. This way, each team sees relevant, accurate information that can be spliced-and-diced based on their own unique needs, without dealing with overwhelming data clutter or digging through multiple systems.

The financial impact of organised data

These operational improvements translate directly into measurable financial benefits.

  • When schedule stability increases and last-minute adjustments decrease, overtime costs drop while client satisfaction improves. Fewer emergency callouts mean lower premium pay rates and reduced administrative time spent on crisis management.
  • Better resource utilisation delivers immediate savings. Understanding which sites consistently require overtime coverage allows for more accurate initial staffing, while optimising the mix between salaried employees and subcontractors reduces unnecessary labour costs. Accurate reconciliation between scheduled and actual time prevents billing discrepancies that can damage client relationships and delay payment cycles.
  • Predictive analytics around shift coverage reduces the financial impact of no-shows. When managers can identify high-risk employees and plan backup coverage in advance, sites avoid expensive emergency staffing solutions or potential contract penalties for inadequate coverage.

The cumulative effect can markedly improve contract profitability.

Moving forward with data as a differentiator

Security operations generate enormous amounts of data through normal business activities. This information sits in workforce management systems, contract management platforms and scheduling databases across the industry. Now, security companies have the opportunity to leverage the data in ways never before possible.

Data Factory, TEAM Software by WorkWave’s Wavelytics data warehouse solution, is on the forefront of delivering this kind of unprecedented business intelligence.

The post From reactive to proactive: how data intelligence is reshaping UK security operations appeared first on City Security Magazine.

]]>
Why transparency is vital in the AI era https://citysecuritymagazine.com/security-technology/why-transparency-is-vital-in-the-ai-era/ Tue, 05 Aug 2025 05:18:00 +0000 https://citysecuritymagazine.com/?p=14435 Why transparency is vital in the AI era Mats Thulin, Director of AI and…

The post Why transparency is vital in the AI era appeared first on City Security Magazine.

]]>
Why transparency is vital in the AI era

Mats Thulin, Director of AI and Video Analytics, Axis Communications, discusses the role the modern security-tech industry must play in ensuring the safe, effective deployment of AI.

AI technology is transforming the security landscape.

Advanced video analytics offer new opportunities to refine and enhance the security process.

AI is changing the rules: human-centric security is rapidly transforming into human-augmented security. Our growing knowledge of AI, combined with innovations in the use of multiple data streams and algorithmic analysis, means we’re entering a new era, one in which AI filters out irrelevant information, leaving security teams sharper and more effective than ever.

But let us be clear: for all its growing power, AI is not a universal solution. It is a vital aid and a great driver of efficiency, but it is not an answer to every problem. Without careful deployment AI can get things wrong. It is effective in the right situations, but blind reliance on AI can lead to costly mistakes, false alarms, or overlooked threats. Its performance depends on quality data, thoughtful configuration, and a full understanding of its limitations.

The burden and importance of clarity

Responsibility for this understanding goes beyond the user. As AI-driven security solutions become more prevalent, it is vital that manufacturers, vendors and installers highlight what they can and can’t do.

Transparency is essential for building trust and enabling end users to make informed decisions. The security industry benefits from a head start in understanding and managing the use of AI – and its potential misuse. With that experience comes a responsibility to ensure that AI is deployed ethically and effectively.

Technology providers, therefore, must generate trust through transparency

Responsibility does not just mean ensuring that technology is used properly, it means being open about the capabilities of AI, the areas in which it will shine and those in which it might struggle. Businesses can only make informed decisions on their security if they have the full information.

They must be able to grasp how different systems perform under various conditions, because any misrepresentation of capabilities or limitations can lead to dangerous blind spots.

Safety through solution design

Some use cases are more sensitive than others. For organisations in critical infrastructure, manufacturing, or chemical processing, an undetected security breach or a system failure could lead to severe consequences or loss of life. In any industry, an AI tool that misses the presence of a trespasser or a mechanical malfunction could result in significant harm.

No AI solution offers universal functionality – its abilities are influenced by the environment in which it operates. AI is, in every case, situational. Certain analytics, for instance, may struggle in poor lighting or noisy environments, necessitating additional data sources or different positioning. Poor camera sensors may not be able to offer AI engines the data they need to perform analytics well. And biases, too, can impact the decision-making capabilities of AI.

If a model consistently struggles to detect movement in certain weather conditions, for example, it is critical that users are informed. Clarity about the limitations of AI helps create a good foundation of overall system design and allows businesses to construct more effective security solutions by avoiding flawed assumptions about AI’s capabilities.

Ensuring responsible use of AI

Technology providers have a secondary responsibility. The power and versatility of AI systems mean they have, like any technology, risks of exploitation and misuse. Some may employ AI in unethical or illegal ways. The security industry has always carried ethical responsibilities in areas such as surveillance. With AI, those responsibilities are equally important.

Measures must extend beyond vendors refusing to sell to customers known to use technology irresponsibly

AI’s growth demands a transparent approach throughout the sales channel. It is imperative that vendors, integrators and manufacturers work hard to foster trusted, open relationships with each other – and exhibit the discretion to work only with partners that align with their ethical and moral views on AI use.

Building an AI future – the right way

The pace of AI innovation makes it difficult to predict what security technology will look like in the coming years. Given this uncertainty, the need for an ethical discussion cannot be overstated: by prioritising openness and fostering strong industry relationships, security providers can positively contribute to a safe and responsible future for AI. Manufacturers should place trust at the top of their list of business goals.

Trust creates a significant competitive advantage in a crowded market, as vendors and integrators are far more likely to recommend a company that has shown a commitment to responsible behaviour over one which acts impulsively over something as powerful and divisive as AI.

As artificial intelligence evolves, the businesses which have demonstrated such a commitment today will be the ones trusted in the future. They are the ones that will lead the industry forward towards a smarter, safer world.

Mats Thulin

Director of AI and Video Analytics

Axis Communications.

Learn more about Axis approach to AI: www.axis.com/campaigns/ai-in-video-surveiliance

The post Why transparency is vital in the AI era appeared first on City Security Magazine.

]]>
How security companies can embrace AI: Six strategies for growth https://citysecuritymagazine.com/security-technology/how-security-companies-can-embrace-ai-six-strategies-for-growth/ Tue, 05 Aug 2025 05:17:00 +0000 https://citysecuritymagazine.com/?p=14433 How security companies can embrace AI: Six strategies for growth Adopting advanced technologies, particularly…

The post How security companies can embrace AI: Six strategies for growth appeared first on City Security Magazine.

]]>
How security companies can embrace AI: Six strategies for growth

Adopting advanced technologies, particularly artificial intelligence (AI), is essential for security companies seeking to enhance operational efficiency, service delivery and business growth.

In the fast-evolving security landscape, technology plays a pivotal role in determining the growth trajectory of businesses, meaning scalability can be achieved without impacting labour resourcing.  Here are six strategies for integrating AI across your processes – from marketing and tendering to stakeholder management – to unlock significant growth potential and adapt to an environment marked by rapid change.

  1. Craft strategic growth initiatives

To remain competitive, security businesses need clear growth strategies that leverage technology. Incorporating AI into strategic planning can help organisations identify emerging opportunities and potential threats. AI systems can sift through vast amounts of data, identifying patterns that human analysts might overlook. This insightful data-driven approach allows businesses to pivot quickly, ensuring they remain ahead of industry trends and adapt to new regulatory demands.

The emergence of new legislation, such as the Employment Rights Act and Martyn’s Law, emphasises the importance of creating a safer community environment. Security companies should make this best practice to comply with these regulations and adapt their services to meet evolving evolving standards. AI can facilitate this by ensuring businesses stay informed about changes in risk and automatically adjust their protocols to enhance compliance and workplace safety, providing better decision making.

  1. Transform marketing and communication

Effective marketing will drive growth in the competitive security landscape. Companies can optimise their marketing efforts by leveraging AI, precisely tailoring campaigns to target specific audiences. AI algorithms analyse behaviour and preferences, allowing organisations to create personalised interactions and relevant content. This targeted approach improves customer and employee engagement and maximises marketing budgets.

Additionally, AI can enhance communication strategies. AI-powered chatbots provide real-time customer support, promptly addressing inquiries and issues. This improves client satisfaction and helps build strong relationships with stakeholders.

  1. Win and retain business

The tendering process is often a significant hurdle for security businesses. AI can help refine and improve tender applications by analysing previous successes and failures, providing insights for future submissions and creating a business large language model (BLLM). By harnessing lessons from past bids, teams can craft more competitive proposals that align closely with potential clients’ needs.

Effectively managing service level agreements (SLAs) is essential for maintaining customer trust and satisfaction. AI can monitor SLA compliance in real time, alerting teams to potential breaches before they escalate. This capability safeguards client relationships and enhances the overall service delivery process.

  1. Enhance employee experience and client efficiency

Central to any growth strategy is enhancing the employee experience. Businesses that invest in employee well-being and provide the tools necessary for success often see increased employee productivity and client satisfaction. AI is an opportunity for this enhancement, offering personalised training programmes, real-time feedback, and streamlined communication channels.

Businesses can ensure employees feel empowered and engaged by creating a supportive work environment backed by technology and real-time data at their fingertips.

As employees become more efficient, the benefits cascade down to clients. Engaged employees are more likely to deliver high-quality service, fostering better relationships and enhancing client satisfaction. This increased efficiency extends the value proposition of security businesses, making them more attractive partners for businesses seeking security solutions.

  1. Embrace AI for operational efficiency

Security businesses need to understand AI’s potential application within their operational framework to capitalise on its capabilities. AI can streamline various processes, allowing teams to focus on strategic initiatives. For instance, automating routine tasks can free up valuable resources, enabling them to concentrate on higher-value activities like employee and client engagement and strategy development.

Moreover, AI can enhance decision-making through predictive analytics. By analysing historical data, AI tools can provide insights into trends and help organisations anticipate client needs and market shifts. Implementing AI-driven analytics tools enables security teams to make decisions based on factual data and enhance responses to be proactive, ultimately improving operational efficiency.

  1. Feed AI with quality content

Despite AI’s tremendous potential, its effectiveness hinges on the quality of input it receives. Businesses must take the time to curate and maintain high-quality content for AI systems to analyse. Regular reviews and updates of data ensure that AI remains a valuable tool for decision-making and operational support. This diligence enhances AI’s utility and nurtures a culture of continuous improvement within the business.

Integrating technology and AI into the security landscape is not merely an option but an urgent necessity for unlocking growth potential. By embracing AI across operational processes, security businesses can enhance efficiency and cultivate an improved workplace experience for employees and clients. As the industry evolves and adapts to new legislative frameworks, these technological enhancements will pave the way for a more secure and prosperous future, fulfilling the promise of a safer environment for all stakeholders involved.

Sarah Cork

Milieu Associates

www.milieuassociates.com

The post How security companies can embrace AI: Six strategies for growth appeared first on City Security Magazine.

]]>
Data & AI Disruption – and Opportunity – is happening now! https://citysecuritymagazine.com/security-technology/data-ai-disruption-and-opportunity-is-happening-now/ Tue, 05 Aug 2025 05:16:00 +0000 https://citysecuritymagazine.com/?p=14431 Data & AI Disruption – and Opportunity – is happening now!  Security operations are…

The post Data & AI Disruption – and Opportunity – is happening now! appeared first on City Security Magazine.

]]>
Data & AI Disruption – and Opportunity – is happening now!

 Security operations are changing. Over the past few years, the conversation around AI and how it will disrupt the industry has mostly been limited to buzzwords and conference keynotes. Now, the industry is at a point where talk is being turned into action and business intelligence, data analytics and artificial intelligence are working together to solve real problems in ways that matter to security businesses.

Look at how security firms work today. Managers juggle complex challenges every day. Staff scheduling often feels like a never-ending puzzle. Decisions happen too late. Profit margins stay thin. Clients want more, but companies struggle to deliver – or to prove they have delivered.

The problem isn’t lack of data. It’s lack of meaningful clean and curated data. Security officers who are using workforce management technology and Enterprise Resource Planning (ERP) systems are already capturing officer movements, client interactions, scheduling details and performance metrics. Still, much of this data sits unused, locked in a myriad of tables in your source ERP systems.

Powerful data analytic and AI systems will change how we use this information, become more agile and make truly data-driven strategic choices.

What’s shifting in security ops

Security teams aren’t new to digital tools. Many already use software for scheduling, payroll, patrol logs and incident tracking. But just using systems isn’t the same as getting full value from them. Right now, the gap is in how data is handled.

Even companies that rely on ERP or workforce management systems often find themselves flying blind when they need fast answers. That’s because most analytical and AI tools and platforms aren’t built for deep analysis or real-time insights that are industry specific. As a result, many companies operate reactively: schedules are fixed after a problem happens, rather than ahead of it. Staffing shortages catch teams off officer. Service lapses are discovered only after a client complaint. And none of this is due to a lack of data.

Security firms are collecting a huge amount already – from clock-in data and patrol check-ins to site notes and officer certifications. The challenge is organising and analysing that data in a near real-time way that helps managers make better decisions, faster.

Why better data matters more than more data

A large volume of information doesn’t help if it’s hard to access, slow to process, or siloed across platforms. That’s where analytics and AI come in – not as flashy features, but as tools that connect the dots.

The real opportunity isn’t in replacing your existing systems. It’s in making them smarter. By layering intelligence onto the platforms you already use, you can take advantage of data that’s just been sitting there. Think of it like turning on the lights in a room you’ve always used in the dark.

Same room, different visibility

For example, instead of manually adjusting schedules every week, you can forecast staffing needs based on actual patterns and fast-moving scheduling changes. Instead of reviewing weekly reports to spot problems, you can see problems and solve them before officers ever leave shift. Instead of being reactive, you’re being proactive.

What happens when you add intelligence

When these tools support true business intelligence, you start gaining real insights.

Things you can gain include:

  • Clearer insight into real-time job performance against budget

Instead of waiting for end-of-month reports to understand whether a job ran over budget, you can see that data in near real time. That helps you spot overspending earlier and make changes before it hits your margins.

  • Track turnover trends and retention risk

Identify patterns that often lead to attrition – like last-minute shift changes, excessive travel between sites or inconsistent hours. When you know which officers are at higher risk of leaving, you can intervene earlier with support or reassignments to improve retention.

  • Exception reporting

With analytics layered into your security software platform, you can more easily detect anomalies when something is operating outside the norm. This reduces surprises and makes compliance easier to manage.

  • Employee schedules align better with actual needs

 Predictive analytics can use past data –seasonal trends, site-specific risk levels contract terms – to recommend schedules that match expected demand. That avoids both under-coverage and unnecessary labour costs.

  • KPIs are not disparate

Things like average cost per post, revenue per hour worked and client satisfaction tied to officer performance can be pulled from your system automatically – no matter who is pulling them. And because the data is live, you’re not relying on backward-looking reports to guide next month’s decisions.

All of this adds up to a better grip on operations and stronger client delivery.

The financial side of smarter ops

For a lot of security companies, labour is the biggest expense. So small improvements in scheduling or coverage can create large savings. And when officer turnover is high (as it is for much of the industry), anything that helps make the job more stable – like more consistent shifts or fewer last-minute changes – helps reduce churn.

That translates into lower hiring and training costs.

There’s also value in what you can prove. If your systems help you track exactly how SLAs were met, or how quickly an issue was handled, that improves client trust. It can also help in competitive contract bids.

Security’s next phase isn’t in the future – It’s Now

This isn’t a five-year plan. Many companies are already making these changes. The tech exists and, in many cases, the data is already being collected. What’s different now is how that data is being pushed for maximum value to your bottom line.

For firms willing to take this next step – by recognising this technology is no longer future-state, but happening and necessary now – the payoff is clear.

David Libesman

SVP & GM AI & Data Analytics

TEAM Software

www.teamsoftware.com

The post Data & AI Disruption – and Opportunity – is happening now! appeared first on City Security Magazine.

]]>
New report from Mercury Security reveals top trends transforming access controller technology https://citysecuritymagazine.com/security-technology/new-report-from-mercury-security-reveals-top-trends-transforming-access-controller-technology/ Wed, 23 Jul 2025 15:59:03 +0000 https://citysecuritymagazine.com/?p=14553 New report from Mercury Security reveals top trends transforming access controller technology  Cybersecurity, cloud…

The post New report from Mercury Security reveals top trends transforming access controller technology appeared first on City Security Magazine.

]]>
New report from Mercury Security reveals top trends transforming access controller technology

 Cybersecurity, cloud enablement and mobile credentials are key drivers

 Mercury Security, a leader in access control hardware and open platform solutions, has published its 2025 Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders.

The report highlights key trends reshaping physical access controller design and selection.

  1. Security-first thinking:

90% of respondents say staying aligned with cybersecurity standards is essential. More than 71% cite advanced protection – secure boot, OSDP, cryptography – as a top decision driver.

  1. Mobile and cloud integration:

55% seek controller compatibility with other credentials, including mobile credentials. Over half (52%) report cloud enablement as critical for scalability, real-time monitoring and remote management.

  1. Reliability is non-negotiable:

63% rank reliability and uptime as the most important criteria in controller selection – far outweighing cost or feature specifications.

  1. Backward and forward compatibility:

86% require controllers that support long-term infrastructure planning through compatibility with past and future systems.

  1. Interoperability and Open Architecture:

76% cite interoperability with mixed-device environments as essential, underscoring the shift toward flexible, standards-based systems.

The report also explores the emerging role of AI and edge computing in controller performance, as well as the growing integration of access data with building operations. Read the full report here.

About HID 

HID powers the trusted identities of the world’s people, places and things. We enable people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and billions of things are connected through HID technology. We work with governments, educational institutions, hospitals, financial institutions, industrial businesses and some of the most innovative companies on the planet.

Headquartered in Austin, Texas, HID has over 4,500 employees worldwide and operates international offices that support more than 100 countries. HID is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com.

About Mercury Security

Founded in 1992, Mercury Security is at the forefront of innovation in access control. With over 30 years of expertise and a commitment to open architecture, Mercury has built a future-proof platform that ensures seamless interoperability between leading software and technical solutions.

As the trusted controller platform supplier for open architecture-based deployments, Mercury has more than 5 million controllers installed worldwide. In collaboration with our partners and parent company, HID, Mercury continues to drive innovation by establishing controller standards that promote long-term stability and adaptability in the ever-evolving security landscape. For more information, visit mercury-security.com.

The post New report from Mercury Security reveals top trends transforming access controller technology appeared first on City Security Magazine.

]]>
When technology advances can security keep up? https://citysecuritymagazine.com/security-technology/when-technology-advances-can-security-keep-up/ Tue, 22 Jul 2025 05:15:00 +0000 https://citysecuritymagazine.com/?p=14429 When technology advances can security keep up?  The technological advances across all areas of…

The post When technology advances can security keep up? appeared first on City Security Magazine.

]]>
When technology advances can security keep up?

 The technological advances across all areas of business and our private lives continue at pace and show no sign of stopping.

 There is no doubt that many of the technologies have provided greater opportunities for businesses, both within the organisation, and with partners and stakeholders, through better data access, shared platforms for collaboration, more powerful computations and, of course, use of AI within decision making and experimental activities.

The challenge for security professionals remains the same – keeping pace with both organisational use of technology and understanding the art of possible with new security technologies. Security, much like safety, often acts in catch-up mode. It’s challenging for the chief security officer to make a case for increased security budgets for what “might be coming over the horizon” in terms of new threat vectors and what this might mean for organisational risks; after all, “it” might never happen.

There are two ways we can tackle this. Firstly, by security professionals being part of the technology discussions from the beginning. Not so that we can be there with a “security says no” approach, but so that we understand what new risks the technology might pose, and consider ways to build it securely without stifling innovation and the art of possible.

The second is to not abandon basic essential security principles:

  • knowing your threat landscape and whether the use of new technology and collaboration changes your business risks
  • air-gapping systems and making use of the “need to know” principles (whether that is people, processes, or data)
  • layering defences, so that your technological crown jewels can remain resilient and operational, and finally
  • instilling in your people good security behaviours so they do not become the weakest link.

The final point above is key, and something that can often be lost in the technological race. All technology, particularly security related tech, is there to aid human decision making. A good example of this is search and screening systems, which have advanced significantly over the last 20 years, increasing throughput and detecting a range of different potential threat objects. However, if the power was to go off, rendering the equipment useless, we can still rely on the human to carry out the same searches. Yes, of course it would take delays and would not be sustainable in the long term, but we could still have confidence that our staff were able to perform the same activities and reduce the risk from certain threats. Key to this is training our security staff on the basics as well as the new skills required to interpret and use technological prompts.

We also have to factor in the limit of human ability. Good technological advances in security equipment need to understand where the current challenges are and where technology can significantly improve decision making. There is an inherent danger when we stop seeing technology as an aid.

As a sector, we should be embracing this technological era, and be fully integrated in the design and use of technology within the businesses that we protect and as part of our own toolkit. This gives rise to the final challenge – that of convergence. The use of technology as a defence means that the traditional silos of technical, physical, personnel, and cyber have to work smarter together, bringing the deep expertise from each specialism to deliver good organisational risk management.

Sarah Austerberry, Au Security Consulting: sarah@ausecurityconsulting.com

Julie Nel, B4 Secure: info@b4secure.co.uk

Hayley Elvins, Sloane Risk Group: enquiries@sloaneriskgroup.com

The post When technology advances can security keep up? appeared first on City Security Magazine.

]]>
The State of Physical Security: 5 Predictions for the year  ahead https://citysecuritymagazine.com/editors-choice/the-state-of-physical-security-5-predictions-for-the-year-ahead/ Tue, 20 May 2025 14:25:29 +0000 https://citysecuritymagazine.com/?p=14268 The State of Physical Security: 5 Predictions for the year  ahead Genetec have released…

The post The State of Physical Security: 5 Predictions for the year  ahead appeared first on City Security Magazine.

]]>
The State of Physical Security: 5 Predictions for the year  ahead

Genetec have released the sixth edition of their annual State of Physical Security Report. Here are their predictions for the year ahead, based on insights from over 5,600 physical security professionals.

1. Cloud Adoption: Pragmatism trumps hype

Almost half (48%) of end users in Europe ranked ageing outdated physical security and/or IT infrastructure as a top challenge.

As a result, while the adoption of cloud-based security infrastructure continues, organisations are becoming increasingly strategic about exactly how and where they deploy the cloud in their environment.

According to the report, 43% of end users envision hybrid deployments as their preferred approach within the next five years, compared with just 18%  favouring fully cloud-based implementations and 17% planning to remain fully on premises.

This preference for hybrid-cloud is also echoed by consultants and channel partners, with 66% of consultants planning to recommend hybrid deployments in the next five years.

  1. Intelligent Automation (IA): Key to AI success

The integration of artificial intelligence (AI) into physical security systems is a promising development and one end users are eager to explore (10% did in 2024 and 37% plan to in 2025). However, concerns regarding privacy, ethics, and data bias still persist.

AI-enabled security solutions can be game-changing, especially when organisations identify key operational challenges and then solve them using intelligent automation (IA), intuitive user experience (intuitive UX), and automation. Effective implementation is also grounded in responsible AI practices, ensuring the technology remains ethical and transparent.

This strategy ensures that the partners developing AI technologies and the organisations using them evaluate the systems, maximising trust and compliance while minimising risks.

Moreover, physical security teams who integrate AI into their security systems will seek outcome-driven benefits, including automated event detection through video analytics and streamlined emergency responses.  By filtering and classifying events for human assessment and identifying process improvements, IA can transform data overload into actionable intelligence.

  1. Regulatory Compliance: A top priority

Compliance has become a critical focus for security leaders as both cybersecurity threats and regulatory requirements continue to grow. Recent data shows record-breaking costs of data breaches in 2024, underscoring the need for strong compliance measures.

Key regulations such as GDPR, SOC II Type II, and NIS2 are shaping how organisations approach data protection strategies, particularly as security systems rely on interconnected networks and cloud storage. In fact, 67% of end users said their organisation was affected by these regulations, a big jump from just 13% in 2023.

In 2025, we are likely to see more organisations focusing on strengthening cyber hygiene practices, improving data encryption, and aligning with international and industry-specific regulatory requirements.

  1. Cross-Team Collaboration: Crucial for success

72% of channel partners anticipate hiring challenges to continue, which may explain why tools that help with ‘data analysis and visualisation’, and ‘improve collaboration between teams’, rank among the top five projects for 2025.

As staffing shortages and budget constraints persist, collaboration between security, IT, facilities, and other departments will become essential for effective security management.

Work management software can help with cross-team collaboration, as it centralises information to improve communication with work dispatching, and resource management, as well as with reports and audits. Meanwhile, digital evidence management tools make it quicker and simpler for teams to collect, review and securely share footage with authorised third parties such as the police.

  1. Organisations will ask more of their physical security systems

Physical security, traditionally viewed as a cost centre, holds valuable data about the flow of people, assets and vehicles. This is why it is increasingly shared with IT departments.

However, security systems are often underutilised within organisations, a phenomenon known as the ‘Consumption Gap’  –  a common challenge organisations face in fully understanding how to leverage the technology. Integrations between security systems, other IoT devices, and operational technologies can fundamentally add value to wider operations. Could 2025 be the year this is increasingly embraced, enabling physical security professionals to present a clearer ROI for proposed investments?

Conclusion

It’s evident organisations are embracing a significant digital transformation, with a strong commitment to updating old legacy systems and enhancing cybersecurity best practices. And despite over half of respondents reporting 100% on-premises deployments of physical security, there is a growing interest in hybrid deployments that can help tackle upcoming challenges more effectively.

You can download the Genetec report

State of Physical Security

www.genetec.com/a/physical-security-report

Nick Smith

Regional Sales Director,

UK & Ireland, Genetec.

www.genetec.com

The post The State of Physical Security: 5 Predictions for the year  ahead appeared first on City Security Magazine.

]]>
AI-Powered Surveillance: The Future of Security is Already Here https://citysecuritymagazine.com/security-technology/ai-powered-surveillance-the-future-of-security-is-already-here/ Tue, 20 May 2025 14:20:08 +0000 https://citysecuritymagazine.com/?p=14261 AI-Powered Surveillance: The Future of Security is Already Here Not so long ago, the…

The post AI-Powered Surveillance: The Future of Security is Already Here appeared first on City Security Magazine.

]]>
AI-Powered Surveillance: The Future of Security is Already Here

Not so long ago, the high-tech surveillance we saw in films felt like pure science fiction. Cameras that could track individuals across a city, systems that could identify threats before they happened: those ideas belonged in dystopian thrillers, not in our world.  

But here we are. AI-powered surveillance isn’t coming; it has already arrived and is evolving at an astonishing pace.

For decades, CCTV technology improved in slow, predictable steps. A sharper image, better storage, and wider coverage. Useful, yes, but hardly revolutionary. Now, that’s changed. And for those in the security industry, it’s time to sit up and pay attention because this is happening fast.

Like so many in our industry, we keep a sharp eye on new technologies. We attend major industry events, even sending delegates to events in far-flung places like Intersec in Dubai, to keep our fingers on the pulse. It was there this year that this acceleration became most apparent.

Over the past months and longer, all the camera manufacturers we engage with have been talking up their advanced AI-enhanced systems. Artificial intelligence is making its way into many technologies, but in CCTV, its impact is particularly dramatic.

The next generation of these systems do more than record; they perceive. They can recognise suspicious behaviour and identify weapons. Some systems incorporate thermal imaging, allowing them to detect weapons even if hidden beneath clothing. It’s no wonder AI is becoming the must-have feature in CCTV.

The benefits are too significant to ignore. Smarter cameras, better detection, fewer blind spots. Every major manufacturer is integrating AI, and from this point forward, the technology is only going to improve.

But what does this mean for CCTV operators? As humans, we are fallible; anyone can miss key moments in realtime. AI doesn’t. Instead of replacing operators, AI acts as a powerful support tool. An extra set of digital eyes that never tire, never blink, and never get distracted. It analyses footage in real time, raising alerts to human operators the moment something unusual happens, and it does so with incredible accuracy.

AI-assisted search functions promise to make security investigations far more efficient. Instead of manually sifting through hours of footage, operators can simply describe a suspect’s appearance, such as a red backpack or a grey jacket, and retrieve relevant clips in seconds.

What once took hours of painstaking review can now be done in moments, allowing teams to act faster and more decisively.

Adoption of these systems will be fast, and doesn’t require major infrastructure changes at all. Instead of replacing entire systems, they offer AI-powered processing units  – small, powerful ‘AI boxes’ that can be plugged into existing CCTV networks.

These devices allow AI to look out at the world through the existing cameras. The existing hardware remains in place while the software does the heavy lifting. This is low-barrier, high-impact, and that’s a recipe for rapid adoption.

We will need to work closely with their IT and compliance departments, and the AI specialists within those teams, to ensure AI-enhanced surveillance is implemented safely and effectively. Having the expertise to manage the technology, train staff, and navigate evolving regulations is essential.

But even smaller businesses stand to benefit. Many AI-enhanced surveillance solutions are becoming more accessible, with cloud-based services that eliminate the need for in-house expertise, making the technology more readily available.

As the science fiction writer William Gibson famously said, ‘The future is already here – it’s just not evenly distributed.’ Right now, AI-powered CCTV is being rapidly adopted in certain sectors and regions, while others are still catching up.

But one thing is clear: it soon will be everywhere.

Peter Smyth

Director of Innovation &Technology

Darren Martin

Director of Operations, Security,

Bidvest Noonan

www.bidvestnoonan.com

The post AI-Powered Surveillance: The Future of Security is Already Here appeared first on City Security Magazine.

]]>
Digital Operations Platforms: Guaranteeing human advantage in our technology-driven industry https://citysecuritymagazine.com/security-technology/digital-operations-platforms-guaranteeing-human-advantage-in-our-technology-driven-industry/ Wed, 05 Feb 2025 13:31:00 +0000 https://citysecuritymagazine.com/?p=14156 Digital Operations Platforms: Guaranteeing human advantage in our technology-driven industry This year has seen…

The post Digital Operations Platforms: Guaranteeing human advantage in our technology-driven industry appeared first on City Security Magazine.

]]>
Digital Operations Platforms: Guaranteeing human advantage in our technology-driven industry

This year has seen a surge forward for technology in the security industry. What are the implications for the people working in security and their future roles?

The past year has introduced a wave of new technologies and AI advancements in the security industry, often sparking concern about the potential replacement of human roles. However, I firmly believe that, in security, the human touch will always be essential, and security is, at its core, a people-driven industry.

Our industry relies on individuals with the intuition, real-life experience, and adaptability needed to handle complex, often high-stakes situations.

There is one area of technology in particular that makes the human element an even more valuable part of modern security solutions: the digital operations platform.

What is a digital operations platform?

You can think of it as a highly experienced mentor who is always by your side – accessible across a range of devices like a smartphone or a tablet, that can provide support at every step.

Not every officer has the same experience or knowledge, and we all begin as novices. These platforms act like a mentor, placing actionable guidance, crucial information, and support directly in their hands, helping them make informed decisions from day one. It’s like having the right advice, ready to guide your every step for every scenario. This can be invaluable even for seasoned professionals.

Digital operations platforms also streamline day-to-day operations, making it easier for teams to stay focused, organised and on mission.

Centralising key functions such as real-time communication, task management, and incident reporting allows security staff to respond more quickly and effectively than ever before.

Features like GPS tracking and NFC verification increase transparency and accountability, while safety functionality, such as panic buttons, provides operators and clients alike with peace of mind.

However, digital operations platforms can provide much more than day-to-day operational support. Modern digital operations platforms enable real-time communication and data sharing in various formats, from voice and text to photos and videos.

By collecting extensive information about how the teams perform and the incidents and events they encounter, security managers can identify trends, patterns and risks that can be addressed in solution design. Plus, having access to important insights means security teams can spot potential risks early and take action before problems arise. This data-driven approach helps teams work more efficiently, allowing them to stay focused on what matters most: keeping people and assets safe and secure.

While these platforms help us do our jobs better, they can’t replace the smart thinking and instincts that experienced security teams bring to tough situations. This is where the real power lies: the blending of technology and human capability will shape the future of our industry.

Digital operations platforms are one of the finest examples of this. Combining the best of both creates a stronger and more effective security environment. This allows teams to face challenges confidently while keeping the human touch at the centre of what we do.

At Bidvest Noonan, we use Task, our custom-built digital operations platform. At one of our major London sites we’ve integrated multiple services into this single platform. This consolidation has streamlined processes, improved reporting, and helped set new standards for operational performance.

Looking ahead, digital operations platforms hold incredible promise for transforming the security industry. These platforms are built to grow and adapt, allowing security teams to integrate new systems and tools as technology evolves.

For example, the exciting growth of AI and predictive analytics offers huge promise, potentially increasing our ability to spot risks before they even arise, empowering us to act proactively.

The synergy between human insight and technological support will continue to shape the future of our industry, guiding us down an innovative path while keeping us firmly rooted in the irreplaceable strength of the human element.

As we move forward, it’s crucial to strike a balance, recognising that while technology is invaluable, the human touch will always be our greatest asset in overcoming challenges and creating safer environments for everyone we serve.

Russell Dean

Director of Operations,

Bidvest Noonan

www.bidvestnoonan.co.uk

The post Digital Operations Platforms: Guaranteeing human advantage in our technology-driven industry appeared first on City Security Magazine.

]]>