Home Articles posted by a&s Adria (Page 53)

AI, Security & the Future of Video: 2025 Trends from Milestone Systems CTO Rahul Yadav

Targeted insights for integrators and resellers navigating rapid shifts in AI-driven security

As AI and video technologies continue to evolve at a rapid pace, system integrators and resellers around the world face new challenges – and opportunities. According to Rahul Yadav, Chief Technology Officer at Milestone Systems, 2025 marks a pivotal moment in the evolution of intelligent security systems. Speaking from years of experience at the intersection of artificial intelligence and video surveillance, he outlines five key trends shaping the future of the industry.

The Era of Agentics

According to Yadav, the most transformative industry shift is the rise of “Agentics” – a term used to describe AI systems that can act autonomously, learn from their environments, and enable contextual decision-making. Unlike traditional, rule-based automation, these AI agents are far more sophisticated than chatbots. For example, these AI agents use generative, training-based approaches to perform complex security tasks, such as identifying threats or triggering response protocols, without needing step-by-step human input. They can wait for specific conditions, respond to prompts, or act on their own initiative when they detect relevant situations. Most importantly, they learn from their actions and adapt to new scenarios, much like human operators.

For resellers, this means a shift toward offering solutions that proactively manage threats and improve response times while reducing the burden on operators. AI agents are already appearing in advanced video analytics and automated monitoring systems – and by the end of 2025, Yadav believes they’ll be a core part of every modern security toolkit.

From IQ to AQ: The Rise of Action Intelligence

Historically, human capability has been assessed through IQ (Intelligence Quotient) and more recently EQ (Emotional Quotient). However, now we’re entering an era where AQ — Action Quotient — is equally important. AQ reflects the ability of AI systems to take autonomous actions on behalf of humans. For example, Tesla’s full self-driving technology not only interprets its surroundings but also makes real-time driving decisions without human intervention.

This shift toward “Action Intelligence” is particularly relevant in security operations. Traditional monitoring systems alert human operators to potential issues, requiring manual intervention. In contrast, high-AQ systems can assess situations, initiate appropriate responses, and adjust their actions based on changing conditions. This transition makes systems more proactive and less dependent on constant human oversight.

For system integrators, this shift underscores the need to design systems that are not just reactive, but proactive. Instead of relying solely on human intervention, future-ready platforms incorporate action intelligence to coordinate across access control, video surveillance, and emergency protocols.

The Human Factor

Although automation reduces routine manual work, Yadav emphasizes that human expertise remains essential, with security professionals’ roles evolving rather than disappearing. As Microsoft’s CEO pointed out several years ago, “It’s not AI that will replace you, but someone using AI who will.”

For integrators and resellers, this represents a chance to position themselves as AI enablers, helping clients transition from legacy systems to intelligent platforms. As end users adapt, they’ll rely on partners who can guide them through both the technology and the workforce transformation it demands.

The Evolution of AI Models

Milestone’s Chief Technology Officer highlights the emergence of three specialized AI model types:

  • Small Language Models (SLMs) tailored for specific tasks
  • Video Language Models (VLMs) focused on video processing
  • Large Multimodal Models (LMMs) capable of interpreting and managing multiple data types simultaneously

This marks a shift from traditional analytics to more advanced, learning-based systems and models that are increasingly efficient, powerful, and cost-effective.

Advancements in AI models are also driving a shift in computing infrastructure—from traditional CPU-based processing toward GPU-centric architectures—transforming how systems are designed and programmed. While major technology companies invest hundreds of millions in training large foundational models, security firms can leverage these models to build custom AI solutions with significantly lower hardware investments.

Today, a mid-sized security operation can deploy effective AI capabilities with a fraction of the cost required a few years ago. This democratization of AI enables resellers and system integrators to deliver advanced tools to smaller clients, ranging from retail to municipal safety agencies, by leveraging pre-trained models adapted for local needs.

Responsible Innovation

As security solutions become more intelligent, trust and transparency will play a crucial role in vendor selection. Yadav cautions that innovation without ethics poses risks for both manufacturers and integrators.

For European integrators working with local governments, critical infrastructure, or enterprise clients, partnering with vendors who prioritize responsible AI—such as Milestone—can provide a competitive edge. Clearly defined AI governance frameworks and client education on ethical deployment will become key differentiators.

Just as consumers prefer trusted brands for their smartphones and personal devices, organizations will increasingly select security technology partners based on their commitment to responsible innovation and ethical AI practices.

The Future of Video Management

To conclude, Milestone Systems’ CTO Rahul Yadav highlights how video management systems (VMS) are evolving from passive recording tools into intelligent platforms offering real-time analysis and automated responses.

This transformation is reshaping security operations — shifting from large monitoring teams to AI-augmented environments where human operators focus on strategic oversight and complex decisions. Routine tasks like incident detection will increasingly be handled by AI.

Yadav stresses that this shift isn’t full automation but a partnership between humans and AI. Success depends on balancing innovation with responsibility, ensuring technology enhances—not replaces—human judgment and empathy.

As the industry advances, adaptability and responsible innovation will set integrators, resellers, and solution providers apart. Now is the time for integrators and resellers to reassess portfolios, deepen AI expertise, and partner with trusted vendors like Milestone – shaping the future of video technology through responsible innovation and flexible solutions.

Interested in choosing the right VMS solution for your organization?

Request a demo (pardot.milestonesys.com/DemandGeneration-EET) and experience capabilities of the latest Milestone technology.

Digital access, the secret to more flexible management of Gen-Z student accommodation

London, June 2025 – Almost everyone attending university for the first time is now a digital native. They expect the convenience – and trust the security – that digital solutions provide. Among other things, they prioritize the mobile experience across almost every platform*. Access should be no different.

 Of course, access management at student premises has long faced a distinct set of circumstances. University accommodation blocks are often large – and have expanded in recent years as student numbers increase**. Daily traffic at these purpose-built accommodation blocks is usually high, with hundreds or even thousands of people moving between bedrooms or apartments and communal areas like canteens, libraries and the laundry.

The client group also presents security challenges: a typical student will not always stick to protocols. Lost mechanical keys are a common occurrence and then take time and expense to replace. In addition, residents are in constant flux. Students arrive and depart all the time. With mechanical security, a room is not fully secure for its next occupant until the keys have been handed in. How can managers know for sure if one has been copied?

Every university has a statutory duty of care, the most important element being students’ physical safety. Digitalizing access for new and existing student accommodation helps them provide it, while increasing time- and cost-efficiency in university management. By digitalizing access, instead of using mechanical keys, estates managers control who comes and goes more efficiently and effectively, boosting security and convenience for everyone.

Digitalize access to boost security and generate additional revenue

A digital access solution helps campus managers feel confident about security – and reassures both students and their parents. When doors and other openings are locked with digital devices, opened with digital credentials or a mobile phone, no one needs to worry about unauthorized key copies in circulation. If someone loses their keycard or phone, a couple of clicks in the software restores security. It is fast and hassle-free.

Digital management also helps universities get more from their investment in premises. For example, it simplifies renting the accommodation as hotel-like units outside of term-time, generating an extra source of income. Existing student credentials may be blocked or suspended and new ones issued to arriving conference delegates or tourists, including on their mobile phone.

When a temporary guest’s reservation ends, their digital access rights automatically expire – no more key handovers, no more reception desk. A simple integration between digital access and booking software puts this revenue stream within reach. Including mobile capability with the digital solution makes the processes even quicker and simpler.

The SMARTair® system, a wireless and mobile solution from the digital access experts at ASSA ABLOY, helps universities to do all this and more – to digitalize with confidence and make their access ready for what’s ahead.

SMARTair: mobile digital access with added safety features

ASSA ABLOY’s SMARTair out-of-the-box digital access solution has a range of battery-powered locks to secure almost any opening — bedrooms, entrances, lockers, gates, parking barriers and more — all managed together by simple web-based software, including in real time and/or remotely if required. Staff and students appreciate the convenience of secure keyless access including via mobile with the intuitive Openow® smartphone app.

A SMARTair digital access solution keeps buildings secure. Everyone experiences the convenience of access without keys. Accommodation managers save time and money with SMARTair’s reliable operation and, as Madrid’s Funway Academic Resort manager Mario Arias notes, “it offers very easy maintenance.”

SMARTair digital access brings operating efficiencies that are near-impossible with mechanical security. As well as eliminating lost-key worries, the SMARTair system logs every door interaction, simplifying incident investigation. Authorized staff consult the software interface for an overview of building access anytime. It’s possible to integrate SMARTair with payment systems in the laundry or cafeteria, so students only carry one mobile or digital ID.

This solution also meets several important safety standards, fixing compliance worries for facilities teams. A Remote Lockdown function helps staff respond quickly by remotely locking some or all doors in an emergency. Alternatively, every SMARTair device can be instantly set to Emergency Open, which unlocks them all. This could provide fire services with instant access to an entire building, for example. Sensors permit facilities staff to remotely check block fire doors are all properly closed. For fast, safe evacuation, easy panic bar integration creates a compliant, access-controlled emergency exit. Fire- and smoke-certified doorsets equipped with the SMARTair i-max Escutcheon are available.

Scalability, easy upgrading, immediate convenience

With SMARTair, switching to mobile or digital access is easy. Doors require minimal alterations when SMARTair devices are fitted, because there’s no wiring needed around the door. Devices are powered by standard batteries and so consume less power than standard access solutions based on wired magnetic locks, saving costs and reducing carbon emissions. It is straightforward to scale the solution anytime, by adding more doors or new functionality, such as mobile keys – the technology is already inside the devices.

Digitalization instantly boosts daily convenience, with no more keys to manage or track. Every authorized user may be issued with a card, bracelet, fob or mobile key stored on their own smartphone, loaded with only the permissions they need. Contractors such as cleaners as may be admitted at same time on specific days of the week, for example. They do not have the unlimited access that comes with a copied mechanical key.

Everything is managed from simple SMARTair TS1000 software or the Web Manager. It’s equally easy to control more than one site from a single interface — for example, if an estates manager runs multiple premises together. “SMARTair does not require any technical knowledge. I trained quickly and found the software very easy,” says Cyril Verger, Managing Director at Easy Student Rennes, where SMARTair digital access secures residents and simplifies the management of purpose-built student accommodation.

Reliable locking devices for long-term cost-efficiency

The SMARTair range has multiple robust, reliable devices built to withstand long-term use by students, site staff and contractors. These are already proven at universities Europe-wide. SMARTair can secure almost any opening – from escutcheons for student bedrooms and cylinders for offices, to padlocks on gates and fences, even outdoors.

It integrates all access around the premises into one efficient digital system with a single control panel. Once authorized with specific permissions, a student can open changing-room lockers, secured with a SMARTair e-motion Cabinet Lock, and an outdoor gate secured with the i-gate Electronic Padlock, with the same mobile device. The SMARTair i-reader secures and filters access at any electrically operated opening, including high-traffic exterior doors, alarmed doors, or an automated parking barrier.

“Having a SMARTair system in place has given us peace of mind,” says Joanna Brunton, Executive Officer at Westbridge Residential School in New Zealand. “It’s quicker, it’s safer and it’s simple.”

To learn more about the benefits of SMARTair digital access, download a free Solution Guide for Student Accommodation at https://www.assaabloy.com/group/emeia/campaigns/digital-access-for-student-accommodations

a&s Adria Awards Returning to Highlight Innovation and Leadership in Security

Following last year’s successful debut, the a&s Adria Awards are set to return for their second edition at the Adria Security Summit 2025, taking place October 8–9, 2025, at Hotel Aleksandar Palace in Skopje. Organized by a&s Adria the awards aim to recognize and celebrate outstanding achievements in the regional security industry.

The 2025 edition of a&s Adria Awards will retain most of the original award categories, with some important updates. Notably, the Smart City Project category is being introduced for the first time this year, reflecting the growing importance of urban innovation in the security landscape.

Updated award categories include:

  1. Access Control
  2. Video Surveillance
  3. Intrusion Detection
  4. Fire Alarm
  5. PA/VA Systems
  6. Cybersecurity
  7. Software (limited to physical security solutions such as PSIM, VMS, etc.)
  8. Most Innovative Product/Solution (limited to products released within the past 12 months, with verifiable proof of release date)
  9. Best Case Study
  10. Security Manager of the Year
  11. Smart City Project

Winners will be selected through a combined process of expert jury deliberation and public voting, ensuring that both professional insight and market relevance are reflected in the final results.

To further promote excellence, award winners will receive extended media coverage in the a&s Adria magazine and on its online portal.

Nomination and Fee Structure

Starting with the 2025 edition, a new nomination fee structure is being introduced:

  • Exhibitors are entitled to submit two nominations free of charge. Each additional nomination will be charged €100 per category.
  • Non-exhibitors will be charged €100 per nomination.

The deadline for submitting nominations is September 10, 2025.

As part of the Adria Security Summit 2025, which will feature over 150 exhibitors and attract more than 3,000 participants, the a&s Adria Awards offer a valuable platform for industry visibility, peer recognition, and regional leadership.

More information, including submission guidelines and voting details, is available at https://adriasecuritysummit.com/as-adria-awards/ , or via email at awards@asadria.com.

Kumar Sokka Appointed CEO of Acre Security

Acre Security has announced the appointment of Kumar Sokka as its new Chief Executive Officer, signaling a strategic shift aimed at reinforcing the company’s long-term growth and innovation agenda.

Sokka, who joined Acre in 2024, previously led two major divisions—Comnet and Intrusion—while serving as a key member of the executive leadership team. With over 20 years of experience in scaling enterprise software ventures and driving digital transformation, he is expected to bring a renewed focus on customer engagement and operational execution.

He takes over from John Skowronski, who had held the role of Interim CEO since August 2024. Skowronski will continue to support the company in an advisory role to the Board of Directors, following his efforts to sharpen Acre’s product direction and market approach during his interim tenure.

As CEO, Sokka plans to steer Acre through its next phase by strengthening relationships with clients and partners, and advancing a unified platform that integrates access control, identity, and intrusion solutions. The goal is to help organizations modernize security infrastructures at their own pace, without compromising stability.

“It’s an honor to take on this role at such a pivotal time for Acre,” Sokka said. “With a solid foundation and a talented team in place, we’re focused on clarity, execution, and innovation — staying connected to our customers and driving the future of smart, adaptable security.”

ICT Announces Martin Vermaak as New Chief Operating Officer

Integrated Control Technology (ICT), a leading provider of intelligent access control, intrusion detection, building automation, and security solutions,  is pleased to announce Martin Vermaak as the new Chief Operating Officer at ICT.

As ICT continues to expand its global footprint, the company’s executive leadership remains focused on making strategic investments that foster a team committed to driving success for partners and customers worldwide. The addition of Martin to the executive team reinforces ICT’s commitment to strategic growth and world-class manufacturing.

Before joining ICT, Martin brings over 15 years of experience at the senior executive level in various roles, including Manufacturing Operations Director, Managing Director, and Chief Operating Officer.  As the new Chief Operating Officer at ICT.

“I’m thrilled to welcome Martin as our new Chief Operations Officer. His expertise and leadership align perfectly with our strategic vision and commitment to investing in streamlined and reliable operations for our partners and customers. With Martin on board, we are strengthening our ability to deliver industry-leading physical security solutions and unmatched support to our customers worldwide.” –  Andy Bane, Chief Executive Officer.

For more information or to inquire about interview availability, please contact Lee Densem, APAC Regional Marketing Manager at ICT, at ldensem@ict.co or +64 9 476 7124.

Allianz Arena Introduces Germany’s First Fully Contactless Stadium Entry System

Allianz Arena, home to football giant FC Bayern Munich, has officially become the first stadium in Germany to implement a fully contactless access system, enabling seamless entry via Apple devices.

The transformation was made possible through a collaboration with Skidata, a subsidiary of security solutions provider Assa Abloy. The advanced system allows spectators to enter the venue using their iPhone or Apple Watch, significantly streamlining the process of admission for the stadium’s more than three million annual visitors.

Using near-field communication (NFC) technology, the system enables users to simply tap their device near a reader at entrance points. This eliminates the need for physical tickets or app-based barcode scanning, reducing wait times and minimizing contact in high-traffic areas.

Beyond ticket scanning, the integrated solution gives stadium operators access to real-time data through mobile monitoring tools, ensuring smoother management during peak crowds. Digital tickets can be issued and managed within the stadium’s internal platforms, while the system continues to support traditional ticketing methods.

To further enhance crowd control, Skidata has introduced a block-based access management feature. This setup limits entry to specific zones within the arena, capping each at 1,500 people to optimize safety and flow during events.

Multiple organizations—including FC Bayern Munich, the German Football Association, and arena operator MSG—can set individual access parameters, offering flexibility across various events and uses. The same infrastructure also manages entry to the FC Bayern Museum and guided stadium tours, which draw hundreds of thousands of visitors annually.

This deployment positions Allianz Arena at the forefront of digital fan experiences in Europe, combining security, efficiency, and innovation in one of the continent’s busiest sporting venues.

Market for Securing the Cloud to Grow to $10.37 Billion by 2030

The global cloud security posture management market size is estimated to reach USD 10.37 billion by 2030, expanding at a CAGR of 10.3% from 2025 to 2030, according to a new report by Grand View Research, Inc. The rapid adoption of cloud computing across industries has been a major factor driving the growth of the cloud security posture management (CSPM) market.

As businesses increasingly migrate their workloads and data to the cloud, ensuring robust security and compliance has become a top priority. CSPM solutions offer real-time monitoring, automated security checks, and continuous risk assessment, giving organisations greater visibility and control over cloud environments. The rising number of high-profile data breaches and cyber security incidents has fuelled the demand for CSPM tools as enterprises seek proactive measures to protect their sensitive information and intellectual property.

Hybrid environments

As hybrid cloud deployments become more prevalent, the demand for CSPM solutions tailored for hybrid environments is rising. With businesses adopting a mix of public, private, and on-premises cloud infrastructures, hybrid cloud CSPM tools offer a unified view of security, enabling consistent security policies and controls across the entire hybrid ecosystem. These solutions bridge the gap between cloud environments, providing seamless security management and ensuring compliance across diverse cloud resources. As organisations embrace DevOps practices to accelerate software development and deployment, the need for security to be seamlessly integrated into the development pipeline is critical. CSPM solutions are now designed to fit into the DevOps workflow, providing security teams with real-time feedback on security risks during development. This integration fosters a culture of security awareness and enables organisations to implement security best practices from the early stages of application development.

Strategic initiatives

The CSPM market has been witnessing an increasing number of strategic initiatives taken by the companies operating in the market, such as mergers, acquisitions, and partnerships. The strategic initiatives aim to improve the solution capabilities and customer base and reach new audiences. For instance, in February 2022, Snyk Limited (a U.S.-based cyber security solution provider) announced the acquisition of Fugue, Inc. (a U.S.-based CSPM solution provider). By the acquisition, Fugue, Inc.’s current capabilities will extend the Snyk Developer Security Platform, enabling it to offer CSPM designed by developers for developers.

Cloud security posture management market research highlights:

Solutions dominate: The solution segment dominated the market with a revenue share of over 68.0% in 2024. The attributes of the CSPM solutions, including automated remediation capabilities and continuous monitoring, have played a significant role in protecting data, resulting in the solution segment’s growth.

Strong SaaS segment: The SaaS segment dominates the market with a revenue share of over 40.0% in 2024. The presence of CSPM solution, which features attributes including the ability to assess the security posture of SaaS applications, and enforce best security practices, has played a significant role in the growth of the SaaS segment.

Fast growing hybrid solutions: The hybrid segment is projected to be the fastest-growing segment from 2025 to 2030. The availability of CSPM solutions, which are best suited for hybrid cloud, offers conditions monitoring and analysis of resources across all environments, which has driven the growth of the hybrid segment.

Regulations drive SMEs: The small and medium-sized enterprises segment is projected to be the fastest-growing segment from 2025 to 2030. SMEs have been working toward increasing their cyber security defence owing to the increasing cyber-attacks and stringent cyber security regulations. This trend is also seen in the CSPM market, thereby driving the growth of the SME segment over the forecast period.

Tackling Persistent Threats in Public Safety Systems

A new report from the Public Safety Threat Alliance (PSTA) threat intelligence team, titled “Public Safety Threat Report: How threat actors maintain access in public safety systems,” sheds crucial light on an often-overlooked phase of cyber attacks. The report examines the techniques cyber criminals use to maintain persistent access in public safety systems such as 911 emergency call handling, radio networks and computer aided dispatch (CAD) systems and looks at how public safety agencies can guard against these attacks.

Gaining initial access to mission critical systems is often just the beginning for threat actors. For public safety agencies, understanding how these cyber attackers maintain access after they’ve breached defences is absolutely critical. If the attackers can stay inside the network they can continue to pursue their malicious goals, causing significant disruption and putting the confidentiality, integrity and availability of mission critical systems at risk.

What is persistent access?

After successfully breaching a network and gaining initial access, threat actors don’t want to be kicked out. This is where persistent access comes in, a key stage within the cyber attack lifecycle.

The primary goal for the attacker is to maintain access to the target network over an extended period. The threat actors aim is to set up multiple access points into the network. This ensures the attacker can return to the network even if defenders identify the initial intrusion and block it.

The PSTA report highlights just how prevalent this is with over 78% of adversaries that targeted public safety systems within the last year using at least one form of persistence to maintain their attacks.

Compromised environment – maximum disruption

Persistence enables threat actors to return to the network after reboots, patching, or even after defenders have removed malware. Successful persistence leads to prolonged dwell time, enabling attackers to locate high-value targets like domain controllers and sensitive data. It allows the attackers to continue to achieve their desired objectives within the compromised environment, ensuring maximum disruption.

Detecting and preventing persistence

Defending against persistence requires a focus on identification because it’s a post-exploitation technique – meaning the breach has already occurred. Early detection is critical to disrupting the attack chain before significant harm is done.

The report clearly shows that persistence is not just an optional step for threat actors, but a fundamental technique used by the vast majority of attackers targeting public safety systems. By understanding how adversaries maintain access – through compromised credentials, new accounts and built-in system features – public safety organisations can better detect threat actors during the persistence phase, preventing progression to the final attack stages where data is stolen and systems are compromised or destroyed.

The Public Safety Threat Alliance (PSTA)

The PSTA was established by Motorola Solutions with Jay Kaine as Director, it is recognised by CISA, and shares vital cyber security information and analysis with public safety agencies. The PSTA publishes threat reports providing crucial intelligence and analysis as well as hosting webinars with cybersecurity experts who share their insights and expertise. The PSTA offers its threat intelligence products and services for its members at no cost.

Criteo Teams Up with Ruijie Networks for High Datacenter Performance and Reliability

Ruijie Networks announced a partnership with Criteo, the Commerce Media company, aimed to equip their global datacenters with “100G TOR Switches”.

Ruijie Networks have been selected by Criteo following a tender issued to several vendors and thorough analysis of their proposals. With over 5.2 billion advertisements per day, which equals to 60,671 ads served per second, Criteo needs a high-performing and reliable network in each of its data centers worldwide to support the flow of data generated for the delivery of the compute and storage capacity based on 39,000 servers.

“Ruijie Networks have been selected not only because they propose a powerful and competitive 100G data center switch, but also for their capabilities to provide support services on SONiC, the Open Networking operating system that Criteo started to implement in 2019” said Djothi Carpentier, Staff SRE at Criteo.

Jean Senechaut, Director of Cloud Service Providers at Ruijie EBG, France, commented: “Ruijie offers an impressive portfolio of networking products, with data centre switches being a key component. We are very proud to begin a strong partnership with Criteo, and we aim to continue expanding in the HPC and AI markets by delivering a high-performance, cost-effective networking solution.”

About Criteo

Criteo (NASDAQ: CRTO) is the global commerce media company that enables marketers and media owners to drive better commerce outcomes. Its industry leading Commerce Media Platform connects thousands of marketers and media owners to deliver richer consumer experiences from product discovery to purchase. By powering trusted and impactful advertising, Criteo supports an open internet that encourages discovery, innovation, and choice. For more information, please visit www.criteo.com.

About Ruijie Networks

Ruijie Networks (SZSE: 301165), founded in 2003, is an industry-leading network infrastructure and solution provider. We are always committed to fully integrating technologies with applications, and creatively solving customer challenges. Ruijie has eight R&D centers, and a global presence in over 100 countries and regions across diverse industries.

Global Anti-drone Industry to Reach Over $14.5 Billion by 2030

The global anti-drone market will reach USD 14.51 billion by 2030 from USD 4.48 billion in 2025, registering a CAGR of 26.5% from 2025 to 2030, according to the latest reports from research company, Marketandmarkets. The global anti-drone market is primarily driven by escalating security concerns over the unauthorised and potentially malicious use of drones across military, critical infrastructure, and public spaces.

Increasing incidents of drone-related threats, such as espionage, smuggling, and attacks, have compelled governments and organisations to adopt robust counter-drone technologies. Advances in detection and mitigation technologies, including AI-powered systems, multi-sensor integration, and directed energy weapons, further propel the market by enhancing the effectiveness and reliability of anti-drone solutions.

Ground-based solutions projected to dominate

The ground-based segment is expected to hold the largest share of the anti-drone market in 2030 due to its versatility, ease of deployment, and ability to cover vast areas with integrated sensor arrays. These systems can incorporate multiple detection and disruption technologies, such as radar, RF jamming, and directed energy weapons, making them effective against diverse drone threats. Their suitability for protecting critical infrastructure, military installations, and public events further drives widespread adoption. Additionally, they offer scalability and easier maintenance compared with airborne or naval platforms, strengthening their dominance in the market.

Commercial sector the strongest vertical

The commercial segment is expected to exhibit the highest CAGR in the anti-drone market during the forecast period due to the rapid expansion of drone usage across industries such as logistics, agriculture, construction, and event management, which raises concerns over safety and security. Increasing investments by businesses to protect assets, comply with regulations, and ensure operational continuity drives demand for effective counter-drone solutions. Additionally, the growing awareness of drone-related risks in crowded urban environments and critical commercial facilities fuels the adoption of advanced detection and disruption technologies. The rising trend of integrating anti-drone systems with IoT and cloud-based platforms further accelerates market growth in this segment, making it a key revenue driver.

Americas hold largest market share

The Americas held the largest share of the global anti-drone market in 2024 due to the strong focus on security and defence, supported by substantial investments in advanced counter-drone technologies. The presence of extensive critical infrastructure, including airports, military bases, and government facilities, makes the region highly vulnerable to unauthorised drone activities, driving urgent demand for effective detection and mitigation solutions. Leading defence contractors, such as RTX, Lockheed Martin, and Northrop Grumman, are actively developing sophisticated systems that combine radar, electronic warfare, and directed energy weapons to address these threats. Additionally, stringent regulations and coordinated efforts between government agencies and private sector players facilitate the rapid deployment and integration of anti-drone systems across various applications. This combination of strategic priorities, technological innovation, and regulatory support solidifies the position as the dominant market in the global anti-drone landscape.

Key players

Some of the key companies operating in the anti-drone market and mentioned within the reasearch include, RTX, Rafael Advanced Defense Systems, IAI, Leonardo S.p.A., Lockheed Martin Corporation, Thales, Saab, Droneshield Ltd, and Dedrone, among others.