Pragmatism, Productivity, and the Push for Accountability in 2025-2026

Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it.

Governance Brings Necessary Pragmatism
In 2025, AI adoption in physical security began shifting from hype and overuse to regulation-driven pragmatism, where organizations also looked to define what they meant by AI vs. machine learning (which has been used in security for years in video analytics, anomaly detection and many other use cases).

This distinction helped leaders avoid conflating long-standing ML capabilities with the new dimension of AI entering physical identity and access workflows, such as generative AI and conversational tools. Such clarity and regulatory pragmatism helped security leaders shift towards asking the more pointed question of what should AI do vs. what can it do?

The question became even more important as organizations realized that intent is a critical decision factor that cannot be automated when deciding access and entitlements. And without human oversight, “black box” AI recommendations easily led to errors and risks that can undermine confidence in access governance.

A Value Multiplier Beyond Features
Organizations embraced the fact that AI should be used to drive customer value as opposed to simply adding new features. One of the early proof points was in customer support, where AI can improve customer support and customer experience, by providing users with self-service options before interacting with a customer service team member.

Consequently, chat/AI assistants began to appear in physical identity and access platforms, though adoption was uneven. Value may have been visible where conversational interfaces have been deployed, but so were the shortcomings (such as script-bound flows, weak intent recognition, and late or failed escalations that left customers stuck in loops).

This mirrors the often-frustrating interactions many consumers experience with chatbots in daily life: speedy but irrelevant answers or the lack of prompt handoff, all of which quickly reduces a user’s willingness to engage with chatbots and discourages continued use.

From a Tool to a Trusted Partner
AI’s most sustained value was how it functioned as a productivity partner for security teams, where earlier industry forecasts about predictive insights, log analysis, and policy reviews came to life.

For instance, agentic AI, the ability to take on defined tasks without constant prompting, embedded itself into daily workflows for security teams. It scanned and summarized new regulatory provisions, it parsed log data to surface anomalies for human investigation, it aided in policy reviews to find overlaps and inconsistencies that had gone unnoticed in spreadsheets, and much more.

AI also extended into training and enablement, showing up as agents that drafted training and educational modules and prepared onboarding kits. As a result, AI stopped being viewed as just another tool in the stack; it earned trust as a partner that amplified human capacity, while keeping security teams responsible for decisions that depend on context.

What comes next in 2026 is about execution, where oversight, AI user interfaces and regulations will shape how AI matures in the security market.

2026 Predictions
Human-in-the-Loop Becomes the Design Standard for Access Decisions
Security leaders will lean into intent and context as two non-negotiables that decide actions, not merely patterns detected by AI. As a result, “human-in-the-loop” will be the design standard for security programs to minimize disruption for users while preserving rigorous controls for approvers. In essence, automation will prepare the case, and people will make the final call.

For example, AI within a PIAM decision engine will assemble an evidence pack of applicable policies, role and entitlement history, timing and location signals, and any detected anomalies, then present a clear recommendation to the security team for assessment. Such an interaction ensures that robust controls and shared responsibility are in place to safely scale the use of AI in physical access and identity lifecycle management.

Conversational Interfaces Become Product-native and Add Real Value
Advancements in chatbot-style, conversational user interfaces will appear as a native feature in PIAM platforms.

They will be deeply trained in physical identity and access terminology, policies, processes, and regulations to augment workflows by gathering the necessary facts, confirming them against policy in real time, and preparing a recommended action for approval.

The effect will be less back and forth for the security administrator and faster, more reliable decisions.

For employees, visitors, contractors, and other trusted identities, these interfaces will simplify onboarding by removing the need to fill out long and repetitive access request forms. Instead, a brief dialog will capture role, duration, location, and purpose, then kick off the right automation in the PIAM decision engine…all while preserving the human checkpoint for higher-risk access requests and changes.

For customer support, effective conversational chatbots assistants will simplify engaging with PIAM vendors, where answers and artifacts (policies, troubleshooting steps, links to relevant records) are served up to shorten time to resolution. They will also be trained in context to escalate to a real person quickly, ensuring a positive customer experience.

Compliance Regulations Drive Disciplined AI Adoption
Meaningful standards and regulations will drive more controlled and thoughtful adoption of AI when it touches PII, makes decisions, or spans cybersecurity and physical security. In practice, this means security leaders will follow guidance from regulations to figure out where AI belongs in their organization, as well as how it must behave, and when a human must be in the loop to avoid mistakes, risk, and over-engineering.

Case in point is the European Union AI Act that sets a high bar, much as GDPR did. It requires risk classification, documentation, and human oversight for higher-risk systems, logging, and explainability. The United States follows state and industry requirements, such as the Texas 2025 AI governance law that adds obligations in healthcare and beyond.

All together, these regulations reinforce the need for auditable AI, combined with human oversight and accountability by design, to be built into physical identity and access workflows…as well as to avoid penalties and fines.

The Bottom Line
AI’s impact on physical identity and access management is about value, accountability and responsibility. Organizations that define AI clearly, embed human oversight, and use conversational and agentic tools where automation genuinely improves productivity and the customer experience will not only follow tightening regulations, but will also earn and increase customer trust.

The winners will be those who treat AI as a dimension of access automation and governance, a force multiplier that augments people while keeping intent, accountability and security at the center.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.