Mobile Takeover at ISC West

All attendees and exhibitors were introduced to “The Future of Security” early Wednesday morning; yet, many exhibitors came to Las Vegas armed with the mobile technology know-how to take on the new wave of mobile communication.

After the initial welcome about the future, the day wore on with a certain pattern visible throughout exhibits: the quest for mobile accessibility. Exhibitors on the ISC West show floor are well aware of the challenge to stay one step ahead of the security technology curve by developing the latest tools in the industry. One ISC West sponsor press conference held by ASSA ABLOY caught my attention.

As traditional door lock providers, ASSA ABLOY is known for delivering door-locking solutions across a wide spectrum – from residential to commercial use. Now the company is showcasing its mobile keys solutions for NFC (near-field communication) locking, wireless security and access control.

Mobile keys give users complete control over entry without the use of physical keys. Executive Vice President and Chief Operating Office Martin Huddart spoke about the company’s vision for the new NFC access control. “We hope this will be a trusted service manager for digital identities,” Huddart said.

Huddart explained how the average wire door system requires eight hours of work; now ASSA ABLOY works with that existing wire architecture and allows users to go through real-time control of locking via mobile device for 60 percent less of the time cost.

“Take away the key under the plant and put it on your phone,” said Huddart. “It only makes sense.”

ASSA ABLOY is still navigating through all parties involved in mobile devices before the product hits the market, but expect to see demos continuously pop up throughout the security industry.

On the other side of the spectrum, Barix is focusing on a more proactive approach to IP-based communications and control technology rather than reactive all while integrating mobile technology into their service.  The company’s new mobile app, Reflector, was introduced in December 2011 allowing customers the power to monitor audio streams on the go.

“Convergence allows people to use more companies for service across more platforms,” said Barix CEO Andrew Stadheim.

Both ASSA ABLOY and Barix demonstrated just how far the quest for mobility has come and on Thursday I hope to see more innovations into the mobile realm.

About the Author

Christina Miralla is the associate content editor at 1105 Media, Inc.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3