Acre Security Acquires REKS, Introducing AI-Powered Innovation to Access Control

Acre Security, a global leader in providing cutting-edge security platforms, is proud to announce the acquisition of REKS, a transformative purpose-built, generative AI solution designed for access control environments. This strategic deal marks a significant step forward in Acre’s mission to drive innovation and redefine the future of security technology.

Developed by Adam and Jeff Groom — who now join Acre to drive its newly established AI Development Team in the roles of Director, Business Development, AI and Director of Engineering, AI — REKS represents a groundbreaking advancement in applying AI into security applications. At its core, REKS empowers security professionals to interact with their systems in a smarter, more intuitive way.

Transforming Access Control with AI

REKS is specifically developed to understand the unique terms and operational language of access control, enabling stakeholders to obtain critical insights effortlessly. For example, a simple query like, “Show me all the access denied events at the data center for the last month” delivers an instant, accurate response — eliminating the need for manual searches and complex reporting.

“REKS brings a new level of intelligence to access control, allowing customers to use their data in ways that make the most sense for them,” said Darren Learmonth, Chief Technology Officer at Acre Security. “This acquisition further strengthens the enterprise nature of our platform and positions Acre as the leader in delivering AI-powered solutions.”

Tailored AI for Security Professionals

The security industry is undergoing a significant transformation, moving away from its reliance on hardware and aligning with rapid advancements in IoT, AI, and IT. This shift marks a broader trend toward systems that prioritize seamless integration, operational efficiency, and adaptability to an evolving security and enterprise risk landscape. Acre has positioned itself at the forefront of this evolution with Acre Access Control, a cloud-native ecosystem platform that combines unparalleled flexibility with a rapid path to cloud adoption. The integration of REKS’ AI engine will further enhance this solution, adding greater sophistication and user-friendliness. Development efforts are actively underway to ensure a seamless implementation.

Unlike generic AI tools, REKS is purpose-built for the access control industry and protects the critical privacy and ownership of customer data. By leveraging SOTA generative AI techniques, REKS understands industry-specific concepts and terminology, setting it apart as the first-of-its-kind in the security space.

“We’re thrilled to be joining Acre Security and bringing REKS to a broader audience,” said Adam Groom. “Acre’s leadership in security technology and their forward-looking approach make this the perfect home for REKS. We’re excited to contribute to Acre’s vision and explore new opportunities to drive innovation in access control and beyond.”

Expanding REKS’ Capabilities

While initially focused on access control, Acre may explore opportunities to expand REKS’ capabilities to other aligned segments such as intrusion detection and visitor management. This will enhance Acre’s ability to streamline operations across a broader range of security needs — revolutionizing how customers access and analyze data.

Building the Future with AI

Adam and Jeff Groom bring deep expertise and a passion for innovation to Acre’s AI Development Team. This team will grow as Acre accelerates the integration of REKS into its product portfolio, delivering powerful AI-driven capabilities to customers worldwide.

“We’re excited to welcome Adam and Jeff to the Acre team,” added Learmonth. “Their vision and expertise will be critical as we explore the full potential of REKS and continue to push the boundaries of what’s possible in security technology.”

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.