dedicated to perimeter safety and security

DKS DoorKing See Clearly 300x600 Banner Ad
Inovonics 600x100 Display Ad

February 2026 Issue

Fast, reliable, and affordable technology solutions are enabling security leaders to successfully plan (and sell up) perimeter safety and security investments. While pressure is growing to improve situational awareness and response to events, the full stack from sensors to communications to alarm management is advancing at AI speed to support security’s mission.

Featured This Month:

Explore the full February issue below.

Doorking 600x100 Banner Ad
PureTech 600x100 Banner Ad

Smart Questions for Smart People…

Exclusive Interview with Fredrik Nilsson, VP – Americas at Axis Communications

Raising the Bar for Perimeter Video Intelligence

I enjoyed catching up with Fredrik to discuss the connection between video technology and perimeter safety and security. A long-time supporter of innovation, he recognized early on that the expansion of the internet and the shift toward cloud-based solutions would allow technology to influence nearly every aspect of our lives—creating new opportunities across both security and business applications. His perspective on what comes next for perimeter protection is well worth exploring.

-Mark McCourt, Publisher

Nilsson: Our goal is to maximize detection accuracy and minimize the false alarm rate in every unique real-world environment. We achieve this by leveraging deep learning on our purpose-built ARTPEC-9 chip, which allows our cameras to intelligently classify objects at the edge and differentiate between genuine threats and common false triggers.

To ensure accuracy holds up in challenging conditions, we champion a multi-sensor approach. This includes thermal cameras for reliable detection in complete darkness and network radar that remains unaffected by harsh weather such as rain or fog. Our most robust solutions leverage sensor-fusion technology, combining radar for highly accurate detection with visual cameras—such as PTZ or bi-spectral cameras—for immediate visual verification and situational awareness within a single system.

Visual cameras enable operators to identify, classify, and track targets in real time, while PTZ functionality allows for dynamic zoom and follow-up when an event occurs. This layered approach delivers performance customers can trust, no matter the environment.

Nilsson: For perimeter security, edge analytics is critical. Customers find immense value in this approach for several reasons. Perimeters are often remote and constrained by limited or expensive network bandwidth. Processing video analytics directly on the camera means only relevant events or small metadata packages need to be transmitted—not continuous high-resolution video—making the solution both efficient and cost-effective.

Edge analytics also ensures resilience and reliability. If a network connection goes down, analytics continue to operate at the edge, detect threats, and store critical event footage locally on an SD card, ensuring the perimeter is never left unprotected.

Finally, the lowest possible latency is achieved at the edge, enabling instant detection and alerts for rapid response. While edge processing handles immediate, localized needs, cloud and server-based systems play a complementary role, supporting long-term storage, system management, and large-scale metadata analysis across thousands of devices to identify broader trends and patterns.

Nilsson: We address nuisance alarms by carefully training our analytics and tuning our imaging to focus on genuine threats. Our deep learning analytics at the edge accurately classify people and vehicles while filtering out common false triggers such as animals, shadows, or moving foliage.

Thermal cameras add reliability in challenging conditions by detecting heat rather than relying solely on visual cues, and network radar provides precise information on object size and speed, remaining unaffected by weather. While using multiple sensors can add an extra layer of confidence, our analytics alone already deliver a high degree of accuracy—ensuring operators only respond to true threats.

Nilsson: Perimeter security cannot operate in isolation. Our platform is built on a foundation of openness and integration. We provide a robust open API (VAPIX®) and the AXIS Camera Application Platform (ACAP), enabling thousands of technology partners to develop solutions that integrate seamlessly with our devices.

As the industry continues to move toward cloud-based solutions, we have also introduced Axis Cloud Connect, which enables partners to integrate devices in the cloud while supporting easier, more secure device discovery and centralized cybersecurity management. This ensures our cameras and analytics work seamlessly within leading VMS, PSIM, and access-control platforms.

Integration goes beyond simply connecting devices—it’s about actionable intelligence. Our cameras generate open metadata so information can flow where it’s needed and be used across the system. Edge-based analytics enable real-time connections to other devices, supporting automated responses and faster decision-making. By leveraging higher-level intelligence, systems can recognize more complex behaviors—such as restricted-area crossings or loitering—improving accuracy and reducing false alarms.

Nilsson: Over the next 12–24 months, the most impactful breakthroughs will come from more powerful edge intelligence and greater efficiency—driven largely by our ARTPEC-9 chip. Its deep learning capabilities will enable analytics to move beyond basic object classification into behavioral analysis, such as distinguishing between someone walking versus climbing a fence.

We also see major advances in multi-sensor fusion, combining visual, thermal, and radar data for significantly improved accuracy. On the efficiency side, standards like AV1 video compression will allow high-resolution video with far less bandwidth. Ultimately, better image quality paired with better efficiency leads to more reliable analytics. You can’t analyze what you can’t see—and we’re making it possible to see everything more accurately and efficiently.

DKS DoorKing See Clearly 300x600 Banner Ad
PureTech Unlock True AI 300x600 Banner Ad

Balancing Security and Flow at High Education Perimeters

Universities face a security challenge unlike any other built environment. They must protect thousands—sometimes tens of thousands—of students, faculty, staff, and visitors every day, while preserving the openness that defines academic life.

Unlike corporate campuses or government facilities, higher education institutions are intentionally designed to be open and welcoming. They encourage collaboration, community engagement, and the free exchange of ideas. Libraries, student centers, dining halls, and quads are meant to invite people in, not keep them out.

This openness also creates vulnerabilities. Rising concerns around campus violence, theft, vandalism, and unauthorized access to sensitive areas have forced institutions to confront an uncomfortable truth: the traditional open-access model is becoming difficult to sustain without added risk.

The challenge is not whether to secure the campus, but how to do so without undermining campus culture, accessibility, aesthetics, or operational efficiency. The most successful institutions are answering this challenge with a layered, identity-driven approach to perimeter and entry security—one that balances protection with flow.

University of Illinois campus

The Dual Imperative: Openness vs. Security

Higher education operates at the crossroads of two seemingly opposing needs:

Openness

Campuses are designed to foster learning, creativity, and community participation. Overly visible or aggressive security can create a “fortress” atmosphere that conflicts with institutional values and student experience.

Security

Universities are responsible for safeguarding people, intellectual property, research assets, and sensitive data. Certain spaces—by nature of what they contain or who they serve—require stricter control.

The goal is not complete restriction but, instead, access based on applications. Effective campus security determines zones where open access is useful and areas where controlled access is a must. Then strategic facilities apply the right level of protection to each.

Critical Security Priorities Unique to Higher Education

Not all campus spaces carry equal risk. A nuanced security strategy recognizes the varying threat profiles across different environments:

Residence Halls

Student housing is among the most sensitive areas on campus. These spaces require robust access control, visitor management, and protection against tailgating and unauthorized entry. Failures here have direct consequences for student safety and institutional liability.

Research Labs and Academic Facilities

Many campuses are home to cutting-edge research, proprietary discoveries, and hazardous materials. These spaces can’t operate with open access. They require stronger controls such as multi-factor authentication and detailed access logs to ensure that only approved individuals can enter and that sensitive work, people, and materials are properly protected.

Event Venues and Student Centers

Student centers, arenas, and performance spaces are some of the busiest places on campus, and their risk levels change constantly depending on what’s happening inside. On game days or during large public events, thousands of visitors may pass through. After hours, those same spaces often need to shift to access for students or staff-only. The challenge becomes how to manage heavy foot traffic easily while maintaining control when public access should be limited.

Administrative and Financial Offices

These offices are the core of the university, housing student records, financial information, and institutional data. Because of what’s at stake, access needs to be tightly managed, monitored, and documented. Strong controls here aren’t just about security but also about privacy, compliance, and maintaining trust with students and staff.

Why Entry and Exit Must Be Treated Differently

One of the most overlooked aspects of campus perimeter planning is the distinction between ingress and egress. Each presents fundamentally different security risks.

Ingress (Entry)

Entry points are where institutions must prevent unauthorized individuals from entering sensitive spaces. Key concerns include tailgating, piggybacking, forced entry, and social engineering. Effective entry design may incorporate credential verification, one-person-per-authorization validation, vandal-resistant construction, and clear sightlines for security staff.

Egress (Exit)

Exit points must balance life safety, evacuation requirements, and theft prevention. Poorly designed exits can become loss points for equipment, personal property, or retail assets. Thoughtful egress design considers visibility, camera coverage, and separation between public circulation and sensitive interior zones—without ever obstructing emergency exit paths.

Treating entry and exit as distinct risk environments allows universities to apply the right control at the right moment, rather than over-securing everything.

A Layered Security Strategy for the Modern Campus

The most effective campus security strategies don’t rely on a single line of defense. Instead, they’re built in layers, each one adding a different level of protection based on risk. This allows universities to secure their most sensitive areas without making the entire campus feel locked down or unwelcoming.

  1. DETER

The first layer is all about discouraging unwanted behavior before it ever becomes a problem. Good lighting, visible security presence, clearly defined access points, and subtle physical boundaries all signal that a space is monitored and intentional. Often, these simple, visible measures are enough to stop casual unauthorized access before it starts.

  1. DETECT

The next layer focuses on spotting issues as they happen. This is where real-time monitoring comes into play by identifying things like tailgating, unusual access patterns, or misuse of credentials. With the help of intelligent sensors and access data, security teams can respond faster and make better decisions based on actual activity, not just assumptions.

  1. PREVENT

At the highest-risk points, such as sensitive labs or data centers, physical prevention becomes essential. Here, the objective is to physically block unauthorized access through verified identity and controlled passage, reducing reliance on constant human supervision.

This layered framework enables campuses to remain open where they should be open and secure where they must be secure.

Identity as the New Perimeter

“Identity as the perimeter” as a concept is reshaping how universities think about access. Instead of relying strictly on keys, cards, or unlocked doors, modern security strategies increasingly tie access privileges directly to verified individuals.

This shift addresses several persistent vulnerabilities:

  • Tailgating and credential sharing are reduced when one-to-one authentication is enforced.
  • Social engineering becomes harder when access is tied to verified identity rather than appearance or assumption.
  • Operational intelligence improves when access data reveals how spaces are actually used—when, by whom, and at what volume.

Identity-based access systems also enable dynamic privileges, allowing institutions to adjust who can access what based on status, time, and risk level, without rekeying doors or disrupting daily operations.

University cafeteria entrance with turnstiles

Designing Security That Preserves Campus Culture

Security in higher education must be as much about design and communication as it is about technology. Students and faculty should feel protected, not restricted. That means security solutions must integrate seamlessly into architectural intent, pedestrian flow, and the campus aesthetic.

Equally important is transparency. When institutions clearly communicate why security measures are in place and how they protect residents, research, and personal safety, community acceptance rises. Education, signage, and consistent policies play a critical role in building trust.

When security is thoughtfully designed and clearly explained, it becomes part of the campus experience rather than an external imposition on it.

By: Amanda Powell, Boon Edam

The Balanced Path Forward

Higher education is unlikely to ever become a fully closed or gated environment, and it shouldn’t. Openness is foundational to academic life. At the same time, today’s risk landscape demands more intentional protection of people, property, and knowledge.

The institutions finding success are those that reject one-size-fits-all security models in favor of layered, identity-driven strategies that differentiate risk across campus environments. By tailoring protection to residence halls, labs, event spaces, and public areas—and by addressing entry and exit as distinct challenges—universities can achieve what once seemed contradictory: a campus that is both secure and welcoming.

With this balanced approach, security becomes an enabler of education rather than a barrier to it by supporting learning, connection, and innovation.

Asylon 600x100 Banner Ad

Next Gen Panic Buttons Enhance School Safety

Woman holding a duress card

In K–12 schools and universities, security personnel and first responders need to react more quickly, communicate more effectively, and cover increasingly dynamic spaces faster. Students and faculty are  constantly on the move throughout the day amongst multiple buildings and outdoor areas. Maintaining safety and security in these spaces demands more robust and mobile solutions beyond conventional panic buttons and alarms.

Modern mobile duress technology addresses many of the longstanding challenges of conventional panic notification systems. Wireless duress cards and location beacons paired with cloud-based software allow staff members and responders to quickly and easily identify the zone, floor, or room where help is needed.

Publisher Mark McCourt spoke with Eric Banghart, Vice President at Inovonics, about how new mobile duress, wireless sensors, and system integrations can better support school safety initiatives while complementing broader campus and perimeter security strategies. He shared proven techniques and processes to improve school safety and security.

Banghart: The challenges faced by K-12 schools and universities are continually evolving compounded by physical changes to building layouts, new procedures and processes, and evolving safety protocols. Educational facilities should look for wireless ecosystem solutions that offer a diverse range of capabilities. This enables implementation of modern wireless solutions such as mobile duress cards, intrusion detection sensors, and even environmental monitoring solutions to enhance safety and security. Such solutions should be highly adaptable and brand agnostic, allowing integration with a wide range of systems from various suppliers so they can be tailored to best meet the specific needs of different users and scenarios.

Banghart: Inovonics’ flagship product is a new mobile duress card that offers new features and enhanced performance in a sleek, compact card design that is comfortable to wear. When deployed as part of an Inovonics advanced location network, it enables staff and administrators to be instantly located the moment the device is activated – down to the zone, floor, or specific room on a campus. This is accomplished using locating beacons installed throughout the school or campus with cloud-based services to deliver location data to during emergencies. When the duress card is activated, an algorithm determines its proximity to the nearest locator based on signal strength, allowing first responders to quickly and accurately pinpoint the wearer’s location.

The new duress card can be easily integrated with other applications, making it an ideal choice for schools that don’t have the resources or coding expertise to build custom applications, or who already have other security solutions in place and want to add this next level of security.

Banghart: In addition to handling critical duress-related events in life-safety situations, our ecosystem of wireless solutions also provides comprehensive capabilities for tracking assets, resources, and individuals. For example, schools can use our suite of wireless intrusion sensors to secure modular classrooms or use our environmental sensors to detect water leaks anywhere on the campus.

Banghart: We have some exciting developments coming out this year that further expand the functionality and flexibility of our wireless ecosystem. We are also further developing cloud-based applications with unique software capabilities and enhanced features to provide enhanced safety solutions.

Banghart: With over 40 years of experience in the wireless market, Inovonics is an established and trusted brand, known for our high reliability and exceptional performance. While there are many wireless products and RF protocols available today, it’s essential to choose the right wireless technology for each application, especially in environments such as schools, hospitals, and public buildings.

And we are squarely focused on the commercial sector, where our wireless technology is engineered to perform in challenging architectural settings. Our systems are specifically designed to navigate the complexities of commercial construction and common sources of transmission interference. When it comes to event and alarm notification, people can rely on us to ensure these critical signals get through. Our solutions work.

Banghart: Behind every product and application we offer, there’s a team of highly experienced professionals who specialize in wireless technology. It’s all we do. And we have some really exciting introductions we’ll be making at ISC West this year that take intrusion detection and event notification to the next level—especially for mid-market applications that demand the best combination of performance, versatility and affordability.

How Physical Security is Essential for DHS’s IT Sector Security Strategy

Despite the emphasis on Zero Trust, cloud security, and AI-supported defenses, the reality is that U.S. IT infrastructure remains physical. It exists in buildings, yards, carrier hotels, and data centers that are only as secure as their physical boundaries. The Department of Homeland Security (DHS), largely through the Cybersecurity and Infrastructure Security Agency (CISA), has built a robust national framework for managing cyber risk. Unfortunately, many organizations falsely assume this framework has solved both their physical and virtual security problems.

The DHS designates the Information Technology Sector as foundational to every other sector of the economy. Cloud platforms, enterprise software, networking hardware, and data services underpin energy, water, healthcare, financial services, transportation, and public safety. CISA is responsible for coordinating risk management, information sharing, and resilience planning across a sector dominated by private ownership. What is often missing from these conversations is that every IT service—cloud regions, federal data centers, network operations centers, managed service provider facilities—has physical perimeters. If they are weak, cyber controls are operating on borrowed time.

IT Infrastructure with server racksIT critical infrastructure includes hyperscale and enterprise data centers, federal data centers, cloud zones, internet exchange points, software build and update environments, service provider facilities, and disaster recovery sites. These locations are attractive targets because access means leverage. Physical access to racks enables hardware tampering. Access to fiber pathways enables disruption. Access to staff areas can lead to insider recruitment, and access to backup systems enables ransomware persistence. Despite this, physical security is often treated as a facilities expense, rather than a national security issue.

The Continuous Diagnostics and Mitigation (CDM) program standardizes how federal civilian agencies inventory assets, manage identities, monitor vulnerabilities, and visualize cyber risk. This is necessary, but only works if the infrastructure remains trustworthy. If network equipment can be physically accessed, tampered with, or privileged access abused, this monitoring degrades into a false sense of assurance.

Federal agencies have made clear that cyber defense is inseparable from physical security. The Centers for Medicare & Medicaid Services has publicly stated its intent to deploy CDM capabilities across its data centers—controls that retain credibility only when access to physical spaces is enforced. Similarly, DHS’s EINSTEIN program monitors traffic entering and leaving federal civilian networks, but that visibility breaks down when network closets, fiber runs, or demarcation points are left exposed. If the physical boundary cannot be trusted, neither can the cyber monitoring built on top of it.

Physical and perimeter security are no longer optional add-ons. They are essential to protecting IT infrastructure. Designs must be deliberate, with basics including anti-climb fencing, controlled vehicle entry, clear buffer zones, and secured cable routes. Further necessities include: surveillance for vulnerable quiet areas, intrusion systems for security centers, and lighting to improve visibility and detection. Access control should be role-based, logged, time-limited, and integrated with identity systems.

DHS and CISA, however, do not directly own this problem. Most IT critical infrastructure is privately owned, and DHS lacks authority to mandate physical security standards across the sector. Instead, it sets expectations, publishes frameworks, coordinates intelligence, and relies on market forces—customers, insurers, regulators, and liability—to enforce discipline. That places responsibility squarely on operators and when a facility is physically breached, no cyber advisory can undo the damage.

Cyber and facilities teams talk about vastly different vulnerabilities, but attackers do not respect the distinctions. For IT critical infrastructure, the perimeter is the first firewall, the gate is an authentication event, and the fence is a trust boundary. Until organizations treat physical infrastructure security as inseparable from IT critical infrastructure protection, DHS cyber programs will continue to inherit risk from unsecured perimeters. Data centers are not just buildings. They are national assets. And national assets require real perimeters.

Call Out Box

When the perimeter fails, every other control becomes harder, more expensive, and less reliable.

For executives responsible for company finances, perimeter security is often misclassified as a cost center. In reality, it is one of the most valuable investments in IT infrastructure.

From a CISO perspective, strong perimeter controls reduce the chance that cyber defenses are tested past their limits. Physical access gives attackers powerful advantages—such as hardware tampering, credential theft, insider recruitment, and persistence. Investing in perimeter security lowers the likelihood that costly advanced cyber tooling, incident response retainers, and regulatory disclosures will be needed.

From a COO perspective, perimeter security protects operational continuity. Data centers, cloud facilities, network hubs, and recovery sites are production assets. Physical intrusions—whether theft, sabotage, or safety incidents—create service outages, SLA penalties, customer loss, insurance claims, and reputational damage. Well-designed perimeters reduce downtime and shorten recovery when incidents occur.

The ROI is clear. Perimeter improvements are minor costs when compared to the risks of excluding them. Unlike cyber investments, investing in perimeter security is a visual safety that satisfies customers, insurers, and board members alike.

For IT infrastructure operators, perimeter security is not about aesthetics or compliance. It’s about protecting the things that make cyber resilience possible.

Infrastructure & Integrations: Beyond False Perimeter Alarms

7 Trends Improving Alarm Management OutcomesMan on phone looking a various alarm screens

What modern security teams need to enable faster, more reliable responses.

For decades, security models were straightforward: receive a signal, follow a call list, dispatch authorities, and document the event. But that workflow is breaking down fast.

Police departments are strained, false alarms carry real policy and reputational consequences, and alarms are no longer enough to trigger urgency. Perimeters are where these challenges are most obvious: outdoor systems generate noisy alarms, and the consequences of getting it wrong range from expensive guard dispatches, to no response at all.

Dismissing even one real alarm as false can be detrimental to business.

Here, we identify seven key trends in alarm monitoring:

Formal and informal verified response policies are changing the costs of perimeter monitoring. When communities are buried in alarms, they prioritize what’s confirmed. That’s pushing providers to build “verification-first” systems to gain confirmation.

The Monitoring Association’s TMA CS-V-01 standard uses an effective model with multiple-attempt confirmation, plus biometric and audio/video confirmation, designed to reduce false dispatches. Central stations are aligning their workflows with this model because it’s the cleanest path to improved outcomes.

What this looks like on the perimeter: a fence disturbance is no longer a “burglar alarm.” It becomes an event packet: camera views, analytic classification (human/vehicle/animal), clip snapshots, location, and a recommended action plan, all before escalation.

More sensors build better situational awareness, but also create more alarms. Video is the best tool for verifying or dismissing an emergency. It’s the crucial link between an intrusion alert and an operator response.

Platforms that enable video workflows—like I-View Now (acquired by ADT) and Immix—are built around a simple truth: operators need fast, consistent access to relevant video and a scripted plan.

Perimeter-specific shift: analytics are tuned for “wide-area reality”—long range, low light, weather, and complex backgrounds—and paired with operator-ready presentations so people can see what matters in seconds.

What is AI really being used for? To save money. That means reducing operator time and the number of events that reach each operator. Intelligent automation handles the red tape, while people manage the high-consequence decisions.

Perimeter impact: when an outdoor alarm triggers 200 times a night due to wind and wildlife, AI-assisted filtering and bundling alerts becomes the difference between a viable service and a nuisance.

A central station’s job used to end with a phone call. Now it increasingly includes intervening.

Two-way audio and talk-down (live or pre-recorded) aren’t just for security. Elite Interactive’s Remote Guarding operators often speak with intruders at customer sites, using calm, friendly conversations to prevent vandalism or theft.

This matters because these situations are often a test before a real breach. If you can disrupt the approach, with a spotlight, siren or voice, you can prevent escalation and reduce dispatches.

According to APCO International, the Automated Secure Alarm Protocol (ASAP) is a new national service that modernizes how alarm monitoring stations send emergency dispatch information. Launched in 2011 as a public-private partnership, ASAP improves how efficiently emergency signals are sent to emergency communication centers. ASAP uses ANSI standard protocols developed cooperatively by APCO International and The Monitoring Association.

Perimeter relevance: verified events can be transmitted with clearer data, enabling faster call handling and fewer, “what’s your address again?” failures at the worst possible time.

The alarm monitoring industry has evolved from small, independent businesses into large companies with multiple facilities. Companies like ADT, Securitas, Everon, and Pye-Barker have become $1 billion plus ARR businesses through acquisition, technology scale, and strong operations.

Bigger isn’t always better, but it does fund investment. It allows for more backup systems, specialized teams, integrated tools, and 24/7 staffing.

The best monitoring operations stand out by focusing on quickly understanding the situation, not by just showing more tutorial videos.

That means:

  • Combining Data: perimeter sensors, video analytics, access events, and schedules into one incident report.
  • Operator UX: the right cameras auto-populate, maps are pre-pointed, and action plans are produced on-screen, rather than in binders.
  • Communication orchestration: onsite guards, management, and (when needed) public safety are quickly notified with the same verified packet.

Perimeter monitoring is now delivering fast, accurate information, helping people to quickly confirm alarms and make the best decisions. These consistent processes lead to reliable and, most importantly, safer results.

FEATURE

Everybody Has a Body: Why Physiological Biometrics Are Redefining Identity at the Perimeter

Everybody has a body—and almost any part of that body can be used as a physiological biometric.

Even today, the idea still sounds a bit like Minority Report (yes, the 2002 Tom Cruise movie—and still the most referenced film whenever security professionals start talking about biometrics). But what once felt like science fiction is quietly becoming one of the most profound shifts in how you prove who you are—with absolute trust, or zero trust—at the perimeter.

Physiological biometrics are identity-verification methods based on unique, relatively stable physical characteristics of the human body. Fingerprints, iris patterns, facial structure, and vein patterns are all inherently unique to an individual. They’re always present, extremely difficult to replicate at scale, and far less vulnerable to theft than traditional PINs, passwords, or plastic credentials.

When used responsibly, physiological biometrics offer something rare in security: stronger protection and less friction. You don’t carry them. You don’t remember them.

You become the key.

Biometrics Are Already Here—And Have Been for a Long Time

Physiological biometrics are not emerging or theoretical. They are already deployed—out in the wild—across governments, enterprises, retail, transportation, and critical infrastructure.

Consider the four most widely used modalities today:

Fingerprints

Fingerprint access control device

Fingerprint biometrics are the most widely used biometric identifier on the planet—and they’re far from new. Their earliest documented use dates back thousands of years to Ancient Babylon and Silk Road trade routes, where fingerprints pressed into clay tablets authorized contracts and confirmed receipt of goods.

Today, fingerprints are deeply embedded in criminal justice systems, immigration programs, border control, and national identity initiatives worldwide. But the true spark for mass adoption came in 2013, when Apple introduced Touch ID on the iPhone 5s. That single moment normalized biometric identity, turning it into something people now use dozens of times a day without thinking about it.

Iris Recognition

Iris biometrics are commonly deployed where accuracy and assurance are paramount. The intricate patterns of the iris are among the most unique and stable biometric traits available, making false acceptance rates extraordinarily low.

As a result, iris recognition is widely used in high-security data centers and mission-critical infrastructure environments. Because iris systems are fast and contactless, they also support high throughput without sacrificing security. CLEAR’s biometric kiosks—now operating in more than 75 U.S. airports—have even reframed iris recognition as a “speed pass” for travel.

Facial Biometrics

Man on phone looking a various alarm screens

Facial authentication has become one of the most visible forms of biometric identity. Millions of people unlock their phones with face recognition, and airports increasingly rely on facial systems for TSA screening and border processing.

Beyond travel, facial biometrics are now used for online identity verification and age assurance, helping organizations meet regulatory requirements while reducing friction. Their strength lies in familiarity—this is how humans naturally recognize one another—even though the underlying systems operate purely on mathematical templates of ones and zeros.

Palm and Vein Biometrics

Vein Icon with padlock

Palm and vein recognition offer a compelling combination of security and spoof resistance. Because vein patterns exist beneath the skin, they are extremely difficult to capture or replicate without cooperation. Several banks in Japan have been using palm vein authentication for ATM security since 2004.

These modalities are increasingly used in retail point-of-sale environments for frictionless payments and in physical access control systems such as turnstiles and secure entry points. Their contactless nature and resilience against fraud make them especially attractive in enterprise and commercial settings.

Identity Becomes Something You Are

Taken together, these modalities illustrate a fundamental shift. Physiological biometrics are not about a single body part or technology—they redefine how identity itself is established and verified.

Identity becomes something you are, not something you carry or remember. The human body becomes a secure interface between people and systems.

That shift comes with responsibility. Because biometric data is deeply personal, trust is essential. Transparency around how data is captured, converted, stored, and protected is critical for both user acceptance and regulatory compliance.

One important misconception worth clearing up: most biometric systems do not store images of your face, fingerprint, or eye. They convert physical traits into encrypted mathematical templates—streams of ones and zeros—that cannot be reverse-engineered into images of your body. Understanding this distinction helps separate fact from fear.

Biometric icons for iris, fingerprint, facial, full face scan

Why Biometrics Align With Human Behavior

People forget passwords. They lose cards. They share credentials.

But they don’t forget their bodies. (Imagine if you could?)

By transforming physical traits into secure, non-reversible digital templates, biometric systems align security with how humans actually behave. When designed correctly, they offer a path toward identity that is stronger, simpler, and more intuitive—bridging physical and digital security with speed and confidence.

Everybody has a body. And when that body is responsibly transformed into encrypted math—not an image of you—it becomes one of the most powerful credentials we have.

What Comes Next: Multi-Modal Biometrics

It gets even more interesting when multiple biometric modalities are combined—fingerprint plus iris, face plus voice—often alongside a PIN or password. This approach, known as multi-modal biometrics, can significantly increase assurance while reducing friction when applied in the right environment for the right use case.

This evolution raises important questions about trust, usability, and system design—questions that security leaders are actively debating today.

By –  Doug OGorden

Join the conversation as I moderate a panel with three security experts on Face, Voice, PIN: The New Credential for Physical Access at ISC West on Tuesday, March 24, at 10:00 a.m.

TRENDS

The Digital Perimeter: Why “Security Camera” Is an Oxymoron for CISOs

Why Protecting the Business Means Protecting OT

For years, organizations have taken comfort in a simple idea: the network is protected. Endpoint security is deployed. SOC dashboards glow green. Alerts are triaged. The assumption is that if the corporate network is secure, the business is secure.

That assumption is increasingly wrong.

Woman holding device overlooking utility property

Operational technology (OT) devices—such as security cameras—are now critical to business operations, widely exposed to cyberattack, and capable of causing business disruption at scale. Yet they are often excluded from core security strategy.

The modern enterprise does not run on email servers and laptops. It runs on machines. Those machines live on the digital perimeter.
They are OT devices, quietly performing the work that keeps commerce, transportation, and daily operations moving.

And when those devices are compromised, the business doesn’t degrade.
It stops.

The Perimeter Moved While Most Security Programs Didn’t

The traditional security perimeter was once easy to define: fences, doors, guards, and firewalls. Today, the real perimeter exists where digital systems control physical processes.

Consider the environments that underpin modern operations. Letter sorters process thousands of packages per hour. Conveyor belts and scanners route luggage across airports. Identity systems validate access. Sensors, cameras, controllers, and readers coordinate people and assets across expansive facilities.

These are not supporting systems.
They are the business.

Yet many organizations still treat OT as a side concern—something owned by facilities, engineering, or vendors. Cybersecurity teams focus on data loss. Operations teams focus on uptime. The growing gap between the two is where risk quietly accumulates.

Why Protecting the Business Means Protecting OT

For years, organizations have taken comfort in a simple idea: the network is protected. Endpoint security is deployed. SOC dashboards glow green. Alerts are triaged. The assumption is that if the corporate network is secure, the business is secure.

That assumption is increasingly wrong.

Mounted surveillance camera

Operational technology (OT) devices—such as security cameras—are now critical to business operations, widely exposed to cyberattack, and capable of causing business disruption at scale. Yet they are often excluded from core security strategy.

The modern enterprise does not run on email servers and laptops. It runs on machines. Those machines live on the digital perimeter.
They are OT devices, quietly performing the work that keeps commerce, transportation, and daily operations moving.

And when those devices are compromised, the business doesn’t degrade.
It stops.

The Perimeter Moved While Most Security Programs Didn’t

The traditional security perimeter was once easy to define: fences, doors, guards, and firewalls. Today, the real perimeter exists where digital systems control physical processes.

Consider the environments that underpin modern operations. Letter sorters process thousands of packages per hour. Conveyor belts and scanners route luggage across airports. Identity systems validate access. Sensors, cameras, controllers, and readers coordinate people and assets across expansive facilities.

These are not supporting systems.
They are the business.

Yet many organizations still treat OT as a side concern—something owned by facilities, engineering, or vendors. Cybersecurity teams focus on data loss. Operations teams focus on uptime. The growing gap between the two is where risk quietly accumulates.

OT Devices Are Not Simple—They’re Exposed

For years, OT devices were passed over in favor of traditional IT assets like servers and endpoints. As organizations hardened their networks, attackers followed the path of least resistance—and shifted their focus to OT.

Today, OT devices are:

  • IP-connected
  • Remotely managed
  • Running embedded operating systems
  • Integrated with enterprise applications
  • Installed once and rarely revisited, often well past end of life

From an attacker’s perspective, they are ideal targets—not because they store sensitive data, but because they are always on, lightly monitored, and essential to operations.

Botnets don’t need sophistication if they can rely on neglect. Malware doesn’t need to steal data if it can interrupt a process. OT devices offer both opportunity and leverage.

Not a Physical or Cyber Problem—but a Business ProblemAirport restricted luggage area

Cybersecurity discussions tend to center on breaches, data exfiltration, and regulatory exposure. OT risk doesn’t fit neatly into that framework.

If malware:

  • Disables a letter sorter
  • Freezes a baggage scanner
  • Knocks access control offline
  • Disrupts cameras or perimeter sensors

The outcome isn’t a headline about stolen records. It’s delayed shipments, missed flights, safety concerns, and cascading operational failure. Business resilience is lost.

And unlike IT systems, OT environments are often fragile. They can’t be aggressively scanned. They can’t be rapidly patched. They can’t always be rebooted without physical consequences. Recovery is slower, riskier, and far more expensive.

The Rise of OT-Aware Security and Asset Intelligence

A new class of vendors is emerging with a focus on OT visibility, hygiene, and resilience—rather than forcing OT environments into tools designed for traditional IT systems.

One example is Viakoo, whose customers include Fortune 500 enterprises, financial institutions, and government organizations. Its approach is designed to:

  • Discover and continuously manage OT devices
  • Diagnose device health and availability
  • Identify misconfigurations, lifecycle risks, and vulnerabilities
  • Enforce cyber hygiene at scale, without disrupting operations

This matters because OT security isn’t about chasing zero-day exploits. It’s about baseline discipline:

  • Knowing what devices exist—physically
  • Knowing whether they are operational
  • Knowing whether they are misconfigured, patched, and password-protected
  • Knowing when they have reached end of life

This work isn’t glamorous. But it’s what keeps businesses running.

There are, of course, other players emerging across the OT security ecosystem. What’s clear is that the OT blind spot is not theoretical. Attackers increasingly shut down operations through ransomware by causing operational disruption, not data theft. OT systems are often the easiest—and most impactful—entry point.

The digital perimeter is now inseparable from the physical one. OT devices are no longer background infrastructure; they are load-bearing systems.

Protecting the network is necessary.
Protecting the business means protecting OT.

If the machines stop, the business stops.

And that is the risk most organizations are still not prepared to explain—let alone manage.

EVENTS

Join Our ISC Education Tracks!

ISC West and SIA Logos Together

Featured SIA Education Tech Talk: Thursday, March 26 | 8:00-9:00AM

Risk is no longer isolated to security teams—it’s a business-wide concern. As a result, modern security platforms are being used to generate operational intelligence, not just protect assets.

This SIA Education Tech Talk brings together industry leaders to examine how security and data platforms are enabling more proactive risk management, highlighting where traditional approaches fall short and what’s working in the field today.

Join these experts:

    • Larry Bowe, CEO, PureTech Systems
    • Bud Broomhead, CEO, Viakoo
    • Mohammed Murad, CRO, Iris ID
    • Mark Landry, Director, AMAROK
    • Mark McCourt, Moderator

The 2026 smartPerimeter.ai Award Nominations Are Open!

2026 smartPerimeter Awards Logo

Every entry receives FREE publicity! 

The smartPerimeter.ai Awards Program recognizes the People, Companies, Solutions, and Projects making a difference in the market and our lives.

Nomination Guidelines and Procedure:

There is no cost to nominate a company, product, service, integration, or person for the 2026 smartPerimeter.ai Awards

Nominations should be related to perimeter safety and security people, companies, products, services, and integrations/case studies.

The same company may submit multiple nominations and may enter nominations in more than one category.

Timeline:

April: Nominations deadline is April 30, 2026

August: smartPerimeter.ai Award Winners

September: Announced in the September Issue, 2026

November: smartPerimeter.ai Awards Reception at ISC East, November 2026

December: smartPerimeter.ai Awards Newsletter Codifies Winners and Nominees

Every entry receives great FREE publicity, including:

  • All Nominees and their entries are profiled in the Special smartPerimeter.ai Awards Newsletter and on our Website.
  • Noted Award Winner in the December smartPerimeter.ai Newsletter.
  • Use of the 2026 smartPerimeter.ai Award Nominee logo.
  • Your listing in the Award Nominee section on the smartPerimeter.ai website.

AWARD Categories

  • Access Control
  • Identity Management
  • Barriers, Fences, Gates, Barriers
  • Surveillance
  • Intrusion Detection Systems
  • Alarm Monitoring and SOC Verification Solutions
  • Access Control
  • Identity Management
  • Barriers, Fences, Gates, Barriers
  • Surveillance
  • Intrusion Detection Systems
  • Alarm Monitoring and SOC Verification Solutions
  • Wired Communications Systems
  • Wireless Communications Systems
  • Security-Specific Communications
  • Redundancy and Backup Systems
  • Perimeter Integration Projects
  • Manufacturers/Software Developers
  • System Integrators and Resellers
  • Architects, Engineers, Specifiers & Designers
  • Perimeter Security
  • Public/Perimeter Safety
Click on the 2026 Awards Tab in the navigation menu above to submit your nominees.

NEWS – FEBRUARY 2026

antaira logo

Antaira has announced its new ultra-flat Ethernet switch, the FNP-0500G-T. Designed for modern control cabinets and space-constrained environments, it offers robust, high-speed connectivity with an installation depth of only 1.24 inches. Learn more.

Milestone logo

Learn how integrator Genesis Security helped slash false alarms by 62% using Milestone’s VMS and Actuate’s AI cloud-based analytics. Read more.

ZKTeco logo

ZKTeco USA announced that its newest access control products, developed with sister company Armatura, are now OSDP Verified—raising the bar for secure, standards-based access control. Learn more.

PRODUCT / COMPANY SHOWCASE

MAGNASPHERE Logo

Magnasphere revolutionized door protection with the first major advancement since the 1930s reed switch. Its patented, award-winning technology sets new standards for high-security performance and offers a more reliable, cost-effective alternative to traditional reed switches. Magnasphere Motion, powered by Inxpect radar, eliminates false alarms, while its motion-sensing platform, panic switch, and anti-climb fence system deliver advanced, connected security solutions for modern protection needs.

PureTech Systems Logo

PureActiv® is an Autonomous Perimeter Protection Software featuring patented Geospatial AI-Boosted Video Analytics. It enhances security by using advanced machine learning to reduce false alarms from sensors and cameras while integrating seamlessly with existing systems. PureActiv® provides real-time intruder tracking, automated detection, and geospatial visualization for superior situational awareness. Its extended detection range cuts infrastructure costs by up to 30% and supports flexible deployment across edge, server, and cloud environments.

Asylon logo

Asylon Robotics: Humans + Robots + AI = Security Redefined

Asylon Robotics is redefining perimeter security by combining humans, robotics, and AI. Through autonomous ground robots (DroneDog™), FAA-compliant aerial systems (Guardian™), and a 24/7 Robotic Security Operations Center, Asylon delivers scalable, cost-effective protection. Their turnkey service enhances coverage, fills the security labor gap, and provides real-time monitoring across critical infrastructure. With 260,000+ missions completed, industry leaders trust Asylon to modernize and strengthen perimeter defense. Visit www.AsylonRobotics.com to learn more.

Asylon Turnkey Robotic Security Banner

#1 Reach to Perimeter Safety & Security Buyers