Home Technology and Products Archive by category Access Control

Access Control

ASSA ABLOY: Short-let operator expands in Europe with smart access

Travellers and residential renters increasingly prefer the convenience of digital access. These solutions also offer commercial benefits to businesses operating in these fast-growing sectors: it becomes faster and more cost-efficient for them to roll-out new sites and to manage access to them remotely without the need for expensive 24/7 front-desk operations.

City Pop is one short-let furnished apartment rental provider operating in both these sectors. Their growing portfolio of design-led properties covers European cities such as Zurich, Berlin, Prague and Milan. They previously relied on an RFID access-card solution. However, manual handling of credentials created a major challenge to achieving their ambitions. They needed a scalable alternative which would simplify access management and enable their business to grow cost-effectively across international boundaries.

For this reason, they adopted card-less, mobile access across their portfolio of serviced apartments – installing Aperio® wireless locks integrated natively with an Incedoä Pro access management system. Doors to City Pop apartments and some common areas are equipped with these contemporary-styled wire-free, battery-powered Aperio escutcheons. “We were looking for a future-proof, reception-less access solution that could scale with our growth across Europe,” explains Pawel Gawor, City Pop’s CEO.

Integrating access with the booking system automatically distributes entry permissions to customers without manual staff handling. Guests can arrive at convenient times without any need for a reception check-in and have a choice of secure mobile access via the City Pop app or a PIN code to enter directly on the Aperio escutcheon’s keypad.

Choosing to standardize locks with the Aperio E100 Wireless Keypad Escutcheon gave City Pop the ability to retrofit buildings without wiring or door damage.

In addition, because reservations software is also integrated with their Incedo Pro system, City Pop automates centralized, real-time, and remote control over time-limited access at multiple sites dispersed around Germany, Czechia, Switzerland, and Italy. Digitalizing access in this way gives them the flexibility to offers apartment stays by the month or, at an expanding number of locations, from one night and up. Their ongoing ASSA ABLOY installation project now totals over 2,500 doors… and is still growing.

Energy-efficient access solution for modern apartment rentals

Choosing this ASSA ABLOY solution also contributed towards City Pop’s sustainability goals. With no key or smartcard management infrastructure, they use less plastic. Eliminating the need for a 24/7 reception reduces unnecessary staff travel: they manage access remotely.

City Pop have also limited their energy use: wireless Aperio locks are powered by standard batteries and draw much less power than equivalent wired access devices. In addition, ASSA ABLOY Signo Readers, installed at external doors, sliding doors, elevators, and some high-traffic interior doors, have an Intelligent Power Mode (IPM) which saves 41% in energy compared to equivalent readers without IPM.

“With Aperio wireless locks and Incedo Pro, we now have a fully digital, mobile-first access experience for our guests with no need for staff on-site,” adds Pawel.

Building Resilient Access Control Systems That Withstand Real-World Challenges

As access control systems become more deeply integrated with identity management platforms, HR systems, video surveillance, and cloud-based applications, the question of reliability during outages or data mismatches has become central for physical security professionals.

By: Prasanth Aby Thomas, Consultant Editor, asmag.com

For systems integrators and consultants, resilience is no longer an optional feature. It is a design principle. Recent expert insights from Hanchul Kim, CEO of Suprema, Steve Bell, Strategic Technology Advisor at Gallagher Security, and Gaoping Xiao, Director of Sales-APAC at AMAG Technology, highlight a consistent message: access control systems must be architected to operate predictably and securely, even when parts of the ecosystem fail.

Designing With Disruption in Mind

Modern access control systems rarely operate in isolation. They are connected to identity providers such as Microsoft Entra ID or Okta, HR systems that act as authoritative identity sources, and often to video management systems for event verification.

This interconnectedness increases operational efficiency, but it also introduces dependencies. If a network connection fails or an upstream database is temporarily unavailable, doors still need to function safely and consistently.

Steve Bell frames the issue clearly. “Reliable access control systems should be designed with disruption in mind, not as an exception,” he said.

According to Bell, integrators and end users should adopt a risk-based approach. “Integrators and customers need to take a risk-based approach to determine which functions must remain operational during outages or disaster scenarios. In many environments, maintaining safe and controlled access to people and critical areas is more important than secondary capabilities such as video monitoring.”

For integrators, this means identifying critical doors, sensitive areas, and life safety considerations at the design stage. The goal is to ensure that authentication and authorization decisions can continue even if central servers, cloud platforms, or network links are unavailable.

Distributed Intelligence at the Edge

One of the key architectural approaches discussed by all three experts is distributed intelligence.

Hanchul Kim describes Suprema’s approach as intentionally practical. “Suprema has taken a deliberately pragmatic approach when it comes to reliability. In distributed architectures, each smart reader can operate as an independent node, storing authorization data locally and continuing to make access decisions even if connectivity is interrupted. This allows doors to keep operating safely and predictably during outages.”

In this model, the reader or controller at the door holds sufficient credential and authorization data to validate users without real-time communication with a central server. For integrators, this reduces reliance on constant network connectivity and minimizes the risk of widespread disruption caused by a single point of failure.

Bell echoes this distributed approach. “This resilience is achieved by distributing intelligence across the system so that authentication and access privileges can continue to be enforced for extended periods, even when central systems or connectivity are unavailable.”

For integrators working in critical infrastructure, healthcare, data centers, or manufacturing environments, this capability is essential. Extended outages are not theoretical scenarios. They can occur due to power failures, cyber incidents, or maintenance events. A system that relies entirely on centralized decision-making can become a liability under such conditions.

The Role of Centralized Architectures

While distributed systems are increasingly favored, centralized architectures still have a role to play.

Kim points out that architecture selection should be driven by site requirements. “Centralized architectures still have a place. Panel-based systems with two-door or four-door controllers remain appropriate in certain environments, and we support those models as well. The key is choosing an architecture that matches a site’s operational and regulatory requirements.”

For consultants, this highlights the importance of tailoring system design to the client’s regulatory obligations, operational complexity, and risk profile. In some environments, panel-based controllers with centralized oversight may align better with compliance or legacy infrastructure.

Gaoping Xiao reinforces the need for distributed capabilities at the panel level. “First, integrators should design systems with a distributed architecture, ensuring that access control panels can continue to operate independently even if servers or databases are temporarily unavailable. This ensures that existing cardholders and credentials remain functional during outages.”

The practical takeaway for integrators is that resilience can be built at multiple layers. Whether intelligence resides primarily in smart readers, door controllers, or panels, the critical factor is the ability to continue enforcing access decisions locally.

Establishing a Single Source of Truth

Beyond hardware architecture, identity management practices are equally critical. As access control systems integrate with enterprise IT platforms, inconsistencies between systems can arise. Data mismatches between HR systems, identity providers, and physical access databases can lead to delayed revocations, incorrect permissions, or audit gaps.

Kim stresses the importance of clarity in identity ownership. “Whether organizations use an identity management platform such as Microsoft Entra ID or Okta, or rely on an HR system as the authoritative source, what matters most is that there is a clearly defined single source of truth. When identity ownership is unambiguous, access control systems can remain consistent and predictable even when upstream systems are temporarily out of sync.”

For integrators, this means engaging early with IT stakeholders. During system design, it is critical to define which platform owns identity data and how synchronization processes function. Without a clearly designated authoritative source, temporary outages can create confusion about which credentials are valid.

Designing for resilience therefore includes both physical hardware redundancy and logical data governance.

Managing Data Mismatches and Recovery

Outages are not the only challenge. Data mismatches between systems can also undermine reliability.

Xiao emphasizes the importance of recoverable integrations. “Second, integrations between identity sources and connected systems should be designed to be recoverable, with clear backup and resynchronization procedures in place. In the event of data mismatches or outages, identities should be able to be restored or resynced in a controlled and auditable manner.”

For consultants advising enterprise customers, this raises several practical considerations. Are synchronization logs retained? Is there a defined procedure for reconciling discrepancies? How are changes tracked and audited?

An access control system that resumes operation after an outage but leaves inconsistent permissions in place can create compliance and security risks. Controlled resynchronization and auditability are therefore essential components of a resilient design.

Kim underscores that resilience is about operational continuity under imperfect conditions. “In practice, designing for reliability is less about preventing every outage or mismatch and more about ensuring that access decisions remain auditable and secure when those situations occur.”

For integrators, this reframes reliability as a management issue rather than purely a technical one. Systems must be designed to behave predictably, generate reliable logs, and support post-event review.

Building Multi-Layered Redundancy

In addition to distributed intelligence and data governance, redundancy at multiple system levels is a recurring theme.

Bell highlights the importance of layered resilience. “Well-designed access environments build redundancy at multiple levels – including controllers, readers, and supporting infrastructure – so core access control can continue operating during events such as power loss, network outages, or cyber incidents.”

For integrators, this can include redundant power supplies, battery backups, network failover mechanisms, and segmented architectures that prevent a single cyber incident from disabling the entire system.

Bell also links physical access design to broader organizational planning. “Aligning
physical access design with broader operational resilience planning is what separates systems that work in theory from those that perform reliably in the real world.”

This alignment is increasingly relevant as organizations adopt enterprise resilience frameworks. Physical security professionals must coordinate with IT, facilities, and risk management teams to ensure that access control systems support overall business continuity objectives.

Selecting Proven Solutions and Support Structures

Technology design alone does not guarantee reliability. Implementation quality and ongoing support are also decisive.

Xiao advises integrators to prioritize proven ecosystems. “Finally, integrators should deploy proven solutions supported by certified system integrators and manufacturer-backed support programs, ensuring long-term reliability, and operational confidence.”

For consultants, this means evaluating not only product specifications but also vendor support capabilities, firmware update processes, and long-term roadmap alignment.
Access control systems are long lifecycle investments. Choosing platforms with robust support structures can reduce the risk of operational instability over time.

Practical implications for integrators

Taken together, the expert perspectives converge on several practical design principles for integrators and consultants:

  1. Adopt a risk-based approach to identify critical functions that must remain operational.
  2. Distribute intelligence so that authentication and authorization can continue locally.
  3. Match architectural models to regulatory and operational requirements.
  4. Establish a clearly defined single source of truth for identity data.
  5. Design integrations with backup, resynchronization, and audit capabilities.
  6. Implement redundancy across controllers, readers, power, and network infrastructure.
  7. Align access control strategy with broader resilience planning.

As access control systems become more integrated and data-driven, resilience must extend beyond door hardware. It encompasses identity governance, system interoperability, and coordinated incident response.

For physical security professionals, the objective is not to eliminate every possible failure. It is to ensure that when disruptions occur, doors behave predictably, access decisions remain secure, and the organization maintains control.

In an increasingly connected security environment, reliability is no longer defined solely by uptime. It is defined by how well systems continue to function under stress, how transparently they recover, and how confidently integrators can stand behind their designs.

KentixONE: An all-in-one physical security and real-time monitoring platform designed just for data centers

Demand for data centers is growing at a remarkable rate. Data’s strategic importance, for both commercial and non-commercial organizations, makes physical security fundamental at these sites. In addition, national and regional regulations place ever more stringent requirements on in-house and co-location operators to take a secure approach to data management and protection.

By: Thomas Schulz Director & Head of Marketing DAS EMEIA ASSA ABLOY Opening Solutions 

E-mail: thomas.schulz@assaabloy.com

Data’s sensitive nature also brings data centers within the scope of the EU’s NIS2 and Cyber Resilience Act. Penalties may be severe for organizations which get data security wrong: the projected cost of an average data breach is 3.8m EUR, according to IBM’s 2025 annual report. The penalty in terms of reputation and/or regulator fines could be even more.

Because staff, contractors and visitors all require varying levels of access at different times, physical security depends on flexible, scalable access management. Systems must enforce strict, least-privilege access policies and prevent the misuse of credentials. Multiple layers must work together seamlessly, with every event logged and traceable. Integration between security, HR, and visitor management systems can ensure access rights stay current as people join or leave projects. Remote and real-time oversight are essential.

The goal is not only to prevent unauthorized access. Data centers aim to maintain a clear audit trail which satisfies ISO 27001, NIS2 and other standards. Intelligent security management underpins the data center’s resilience and operational efficiency – deterring hybrid physical & cyber-attacks in the process, for example.

“As a powerful new addition to our stable of digital solutions, the KentixONE platform was designed specifically from the ground up for the white space of data centers,” explains Jochaim Mahlstedt, Managing Director at Kentix GmbH, part of ASSA ABLOY. “It performs eight critical security tasks within its one intuitive, integrated platform. With KentixONE, we can equip data center white space with the security and monitoring capacity it needs – now and well into the future.”

KentixONE: control and convenience from a unified interface

A recent addition to ASSA ABLOY’s portfolio of digital solutions, KentixONE is an integrated platform for physical security and critical monitoring. This unique solution combines 8 different data center functions within one system, all accessible from a single, unified interface:

  • access control
  • intrusion detection
  • video surveillance
  • external fault report
  • early fire detection
  • environment monitoring
  • power monitoring
  • network monitoring

KentixONE strengthens data security by creating a direct link between physical infrastructure and IT operations: it supports seamless integration with data center infrastructure management (DCIM), ticketing systems, and EAC solutions. It can keep sensitive operational data under local control while enabling granular access management, full audit trails, and real-time alerts. At rack level, integrated cabinet access control, intelligent PDUs, and environment sensors allow operators to set temporary permissions, track interventions, and monitor energy usage by rack. Its integrated functionality and approach to risk management across multiple potential factors also helps a data center to achieve important security certifications EN 50600 and ISO 22237. The platform is designed to scale from small technical rooms to multi-site data-center estates, helping an organization’s infrastructure to grow, evolve, or become more geographically spread without adding complexity.

KentixONE’s early fire detection monitoring capability – before a fire breaks out – goes beyond conventional smoke-based systems by correlating thermal imaging, gas detection, temperature trends, and air-quality data to identify risks much earlier. This is especially important in high-density computer environments and battery-powered infrastructure where traditional alarms often activate too late to be effective. Indeed, KentixONE offers real-time overview for more than 40 potential physical risk factors, from unauthorized entry and perimeter breaches to overheating, humidity changes, water leaks, and power anomalies. Everything the security manager needs is accessible on dashboards or via the convenient mobile app.

“According to many of our customers, KentixONE makes significant operational cost savings when measured against traditional siloed solutions,” adds Joachim Mahlstedt. “This also helps to explain why its wide adoption in a range of settings, including a co-location facility in Heidelberg, an on-premise solution for a major utility, and for a provider of modular, container-based solutions. Its flexibility and cost-efficiency are a major plus for data center managers.” “Data centers deserve a digital security management solution built entirely with their needs in mind,” he adds. “Now they can have it.”

Salto Introduces DBolt Touch Outdoor

Salto expands its residential smart locking technology with the launch of the DBolt Touch Outdoor model, an IP55-rated smart deadbolt designed to deliver secure, keyless access to exterior and weather-exposed residential doors

By: Agnieszka Filipowicz, Business Development Manager, Central and Eastern Europe, Salto ; E-mail: a.filipowicz@saltosystems.com

The Salto DBolt Touch Outdoor is a smart locking solution for both retrofit and new construction multifamily properties, extending smart access beyond interior unit doors. Built to withstand everyday exterior conditions, the outdoor model combines durability with a refined, modern design suited for residential environments.

Like its interior counterpart, the outdoor version features the latest Salto electronic access technologies, including Salto SVN, BLUEnet, and JustIN Mobile, supporting both cloud-based and stand-alone access. Fully compatible with Salto Space, Salto KS, and Salto Homelok, the DBolt Touch Outdoor enables flexible smart access management while enhancing security, operational efficiency, and the resident keyless experience.

With multiple finish options available, the DBolt Touch Outdoor blends seamlessly into building design while connecting wirelessly to a smart living ecosystem. Through Salto smart access platforms, the solution unifies security, access control, property operations, and the resident experience in a single smart keyless access solution for residential living.

Wire-free and designed for easy deployment, the DBolt Touch Outdoor fits standard deadbolt preparations without drilling, simplifying installation across apartment units doors.

The Salto Systems DBolt Touch Outdoor is designed specifically for apartment unit doors, residential homes, and retrofit multifamily properties. It fits standard deadbolt door preparations and requires no drilling, allowing installation on existing doors in just minutes using only a screwdriver. The lock features a convenient touchscreen keypad and operates on battery power, eliminating the need for any hard wiring. With an IP55-rated design, it is suitable for exterior use and resistant to weather exposure. The device is fully compatible with the Salto Space, Salto KS, and Salto Homelok platforms, and supports flexible credentials, including RFID keycards and fobs, NFC, JustIN Mobile BLE credentials, and resident PIN codes.

Issue, revoke, and manage digital keys remotely, offering the control, security, and convenience today’s residents and operators demand. The DBolt Touch Outdoor extends the Salto residential smart access portfolio, no more searching for lost keys, with DBolt Touch smart lock series residents can use your smartphone, key fob, or key card, putting you in control of home security, supporting modern multifamily living and evolving resident expectations.

To learn more about the Salto smart home door locking solutions, visit Salto DBolt Touch.

Introducing Salto DLok — the next-generation, universal smart home lock built for every door.

DLok represents the latest evolution of Salto’s smart home locking technology, delivering a universal, motorized smart lock that integrates seamlessly with the Homelok smart living ecosystem to support the residential access experience.

 Salto launched Salto DLok, the latest residential door smart locking solution. DLok marks a new stage in Salto’s smart home innovation. This universal, motorized smart lock connects with the Homelok ecosystem to support residential access for smart homes and apartments, providing enhanced security, keyless access, and automation. DLok enables residents to use a digital, automated, and broadly compatible access solution in their homes.

Smart locking solutions and advanced access control technologies are transforming how residential spaces are protected and managed. DLok is engineered to address the growing demand for connected living by offering a reliable and secure universal retrofit solution that ensures doors are properly locked or opened without physical keys, relying on a resident Digital Key app as a core automation feature.

Next-level automation and seamless integration

Salto’s DLok smart lock is designed to support seamless residential use. Fully automated locking minimizes manual effort while helping ensure the door remains securely locked. Using the Homelok mobile app, residents can unlock their unit door from a smartphone, enabling convenient access control for themselves, guests, and visitors. As a universal motorized smart lock, DLok connects directly to the Salto Homelok smart living ecosystem, enabling keyless access and integration with other Salto solutions.

Redefining mechanics, electronics, and design

DLok introduces engineering advancements in connectivity, reliability, and aesthetics. The lock offers broad compatibility through multiple model options and retrofit accessories designed to replace existing door hardware and fit standard door types, including Euro, Scandinavian, and North American deadbolt variants. DLok supports universal retrofit installation and can be installed in under 15 minutes, without requiring replacement of the existing lock or door handle.

Mechanical durability is improved through a more powerful motor rated for more than 50,000 cycles, along with updated metallic shafts and support components. Calibration accuracy is enhanced through a magnetic calibration sensor that replaces mechanical components, improving lock performance and status reporting. Updated electronics support a semi-automatic calibration process combining automatic and manual steps to improve overall performance and reporting accuracy. From a design perspective, a redesigned flat thumbturn provides a cleaner appearance, with a subtle straight marker offering visual rotation feedback.

Engineered for innovation, security, and simplicity

DLok incorporates engineering enhancements focused on durability and reliability while maintaining a contemporary design. In addition to the lock itself, Salto has developed a universal cylinder along with a range of adaptor accessories.

The result is a broadly compatible solution that allows residential doors to be upgraded with smart access functionality in a limited number of steps. DLok supports a full installation process that typically takes around 15 minutes, including cylinder replacement, guided by a visual step-by-step installation process with no drilling or additional tools required. The lock is installed entirely from the inside, maintaining a minimalist and unobtrusive exterior appearance.

Compatibility is further extended through the Euro Compact Turner Adaptor, which supports retrofit installation on European profile cylinders (PZ). The adaptor allows smart lock installation while accommodating residents who wish to retain existing mechanical keys.

Keyless access for a smarter, safer home

DLok is a universally compatible solution designed to transform residential doors into smart access points while remaining invisible from the outside. Its design supports compatibility with most door types and retrofit scenarios.

DLok reflects Salto’s continued focus on residential smart access by combining keyless convenience with enhanced security in a single solution. Universal compatibility supports cost-effective retrofit installation without requiring replacement of existing locks or door handles.

DLok represents a step in Salto’s residential market strategy, bringing established smart access expertise into the home environment. The combination of smart access technology and universal design supports secure and intuitive residential access, with flexible installation options and broad geographic compatibility.

To learn more about Salto smart home door locking solutions, visit Salto DLok.

Mobile access unlocks a new way to work and a whole range of possibilities

In business and personal life today, digitalization increasingly means moving to mobile. Mobile-first is becoming the norm across regions and industries. In Western Europe alone, there are 459 million active smartphones and only a fraction of these are currently used for digital access. This is changing fast: one projection suggests mobile credentials’ CAGR of more than 22% over the next 7 years.

By: Thomas Schulz, Director & Head of Marketing ASSA ABLOY Opening Solutions EMEIA

E-mail: thomas.schulz@assaabloy.com

This rapid growth seems only natural: in terms of access management, it is more secure and more convenient, for both building users and managers, when the smartphone also becomes a key. From an organizational perspective, digitalization helps to maximize the productivity of existing assets. By adopting a mobile ethos, in access and beyond, businesses increase convenience for their users and the security of their buildings. It is easy to understand why mobile is, according to one analyst, “the dominant trend in access control”.

Making life easier and enabling mobility for users and facility managers

Using mobile keys for access helps building users to act faster, work smarter and collaborate better within teams. Similar convenience benefits have already made banks, travel agents, food delivery services and more into mobile-first sectors. With mobile access, staff and visitors no longer need to carry or keep track of keys, fobs, badges or cards. The convenience of replacing plastic key-cards with secure mobile keys is obvious.

From an access management perspective, mobile access enables the secure movement of people into and through premises – and simultaneously streamlines daily work for security managers. Mobile credentials are also more secure. Phones are almost never loaned to anyone else, and are harder for a user to lose. Mobile credentials are easier for security managers to amend or de-authorize than a mechanical key. Changes to anyone’s access permissions can be made over the air, without any need for dedicated readers or asking a user to check-in their credential.

Furthermore, when a security administrator cancels a mobile key, it vanishes immediately. No more time-wasting handover meetings are scheduled when a tenancy, employment contract or authorized visit ends. Remote access management via smartphone and a secure cloud saves facilities staff time and hassle. They work smarter and more flexibly, benefitting both their well-being and their organization’s productivity.

“At ASSA ABLOY, we were very quick to spot the benefits of mobile access for all kinds of stakeholders,” explains David Moser, SVP & Head of Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. “So many of our access innovations provide the option to make access not only digital, but also mobile.”

Broad range of mobile access solutions from ASSA ABLOY

ASSA ABLOY offers customers a choice of mobile access solutions, both within complete digital access systems and via devices which plug seamlessly into an existing security management solution. Multi-residential housing is just one sector, among many, where the advantages of mobile access have seen its rapid growth. Fast-growing build-to-rent housing provider Becorp is just one that has benefited from its convenience. For a planned new development in Barcelona, they sought a digital alternative to mechanical keys. Becorp realised that a keyless solution would save property management time, which is often spent handling hundreds of physical keys. The burden on staff is especially great when properties are newly occupied or vacated, a regular occurrence in large build-to-rent complexes.

Residents instead use secure mobile keys in their own SMARTair Openow® app. “Physical key management for any large development puts severe pressure on operational costs,” explains Becorp’s Xavier Casals. “Choosing SMARTair wireless locks and mobile management via Openow helps us to minimize them.”

“We have several more mobile access solutions, providing customers with a choice to meet their exact needs,” adds David Moser. “CLIQ® Connect is a mobile extension to ASSA ABLOY’s CLIQ programmable key access solution. A keyholder no longer needs to update access rights physically in person. Their system administrator simply opens the CLIQ Web Manager – from anywhere – and updates it. The key-holder makes an encrypted connection between their programmable BLE key and the app on the mobile to instantly update permissions from the cloud.”

“Yet another mobile solution, CLIQ Go, is designed for small and medium-sized businesses. It offers easy access management from a mobile. CLIQ Go makes it simple even for non-specialists to manage their own access, digitally and from the palm of their hand.”

Adding mobile access to an existing EAC solution or new application

Mobile access is also built-in to ASSA ABLOY digital access devices designed for seamless integration with existing systems and hardware. Battery powered Aperio® locks are compatible with both Bluetooth and NFC mobile wireless protocols. Aperio mobile access offers Seos®-based, class-leading cryptography and authentication, plus unrivalled privacy protection.

Utilizing HID Seos® technology, Aperio also supports employee badge in Apple Wallet, enabling quick, convenient entry to doors, cabinets, lockers, server racks and more equipped with Aperio wireless devices. ABLOY CUMULUS is another keyless access solution, also part of the suite of connected Digital Access Solutions from ASSA ABLOY. With ABLOY CUMULUS, tailored access rights are issued directly on a user’s smartphone. Their personalized, encrypted mobile credential unlocks any authorized opening. In addition, the revolutionary CUMULUS Controller brings mobile unlocking via Bluetooth to any electric or electronic lock – from any brand.

“We engineered CUMULUS to help businesses increase their mobile capability to really get their access ready for what’s ahead,” explains David Moser. “It is completely customizable, with APIs and SDKs for smartphone app development. Mobile becomes part of their business”

“Like all our mobile access solutions, we hope it helps our customers to realize new possibilities in whatever they do.”

To learn more about living mobility with Mobile Access Solutions from ASSA ABLOY, visit https://www.assaabloy.com/group/emeia/campaigns/mobile-access

 

 

 

Innovatrics HQ Shows What Identity-First Building Security Looks Like

Biometrics House, Innovatrics’ new headquarters in Bratislava, is designed as a working model of identity-first building security, demonstrating how hands-free access and visitor management can scale without compromising privacy.

Innovatrics is now operating from a new global headquarters in Bratislava, Slovakia, and the building is not just where the company works. Known as Biometrics House and billed as the world’s most biometric building, it is designed to run on a simple principle: trust starts with identity. In practice, routine movement through the site can happen without badges, PINs, or a reception queue, while security teams keep clear oversight of who is where, and why.

For security professionals, the message is practical. Biometrics is no longer limited to controlled checkpoints at airports or high-security sites. When it is deployed with the right safeguards, it can become part of everyday building operations, from visitor management to access control and incident response.

Identity as the Access Layer, From Parking to the Elevator

Biometrics House has been built as a working example of how multimodal identification can replace traditional credentials across an office environment. Set next to Bratislava’s Vinohrady train station, about 15 minutes from the city center, Biometrics House is organized across four floors, with team zones, meeting rooms, and workshop areas designed to support both focused work and collaboration. Shared spaces such as the bistro, social-stair lobby, terraces, and Zen zones are designed to keep the day moving without requiring people to leave the building. From above, its footprint echoes a fingerprint, a deliberate reference to the company’s roots in fingerprint recognition.

The security concept is centered on recognition rather than possession. Employees and approved visitors can be identified via facial or palm recognition, reducing weak links associated with borrowed cards, shared codes, or forgotten credentials. In practice, this extends beyond the front door. Parking access can be handled the same way, and lifts can be tied to identity so that users are routed to permitted floors without extra taps or swipes.

Visitor handling is also built around traceability. Instead of issuing temporary badges and hoping they are returned, enrollment can occur before arrival or at a self-service kiosk. Once inside, pre-registered entry and a structured visitor journey help guests reach meeting rooms efficiently, while access permissions remain defined and traceable.

“We imagine a workplace where even your desk is dynamic, assigned not by habit but by what you’re working on that day. The building itself adapts to your projects, your team, and your agenda,”

Innovatrics Founder and CEO Jan Lunter.

Built for Security, Designed for Privacy

Any identity-first building stands or falls on trust, and Biometrics House puts data protection in the foreground. Innovatrics says the building goes beyond GDPR requirements through biometric data decoupling, minimal data storage, and secure on-device camera processing. Users are also given clear choices during registration. With consent, biometrics can be used for hands-free access across authorized zones. Without consent, data can be anonymized and limited to essential security checks to prevent personal identification.

From an operational perspective, the site is also a live environment for modern building security practices: real-time zone surveillance, intrusion detection, and automated alerts that can escalate events without stopping normal operations. For higher-risk scenarios, anti-spoofing and liveness controls help prevent attempts using photos, videos, or masks. A robotic “guard dog” provides a visible deterrent and can be used for patrol or guided-escort tasks.

A Living Lab for Integration, Not a Showroom

What makes Biometrics House notable is not the novelty of face recognition alone, but the way the building is used. The HQ functions as a permanent test site where identity, video, and access workflows can be evaluated under real office conditions, not just in a demo room. That matters for integrators and end users who need answers to practical questions: how onboarding is managed, how exceptions are handled, how audit trails are kept, and how systems behave during peak hours.

It is also a place to see how building automation and security can work together without turning the workplace into a checkpoint. Meeting spaces and shared facilities can be prepared based on verified presence, while environmental monitoring keeps comfort parameters such as air quality, humidity, and lighting under continuous control.

Design choices are tested the same way the technology is: in motion. Teams observe how layouts shape behavior, adjust based on what actually happens day to day, and treat the office as something that can learn. “We imagine a workplace where even your desk is dynamic, assigned not by habit but by what you’re working on that day. The building itself adapts to your projects, your team, and your agenda,” says Innovatrics Founder and CEO Jan Lunter. It is an approach that turns the HQ into a flexible, connected environment that evolves with the people inside it.

Sustainability as Resilience

Although the headline feature is biometric operation, the building’s energy approach supports day-to-day resilience. Biometrics House operates without a gas connection, uses geothermal energy and solar power, and captures rainwater for reuse. A recycled aluminium facade and other material choices underscore that a high-security building can also have a lower operational footprint.

As identity moves closer to the center of physical security, Biometrics House offers a practical reference point: a fully operational workplace where biometric access, privacy safeguards, and building management have been combined into one repeatable model.

About Innovatrics

Innovatrics is an independent EU-based provider of trusted identity and biometric solutions used by governments, businesses, and law enforcement agencies to keep people safe, onboard new customers, and build institutional trust. Since 2004, the company has delivered flexible biometric identification solutions that have benefited more than a billion people worldwide, with algorithms that consistently rank among the fastest and most accurate in fingerprint, face, and iris recognition.

Unifying wireless digital locks and smart key access gives security managers much more control

Sometimes a digital system cannot cover all the openings an organization needs. Readers, escutcheons and security locks can equip many doors. But what if they also want to deploy intelligent key-operated locking for alarm boxes, medicine stores, server rooms or power units? Until now, the only secure option was to run two systems in parallel. A new integration between two digital ecosystems puts facilities managers in control like never before.

Author: Thomas Schulz Director & Head of Marketing ASSA ABLOY Opening Solutions EMEIA

E-mail: thomas.schulz@assaabloy.com

The SMARTair® wireless access system, part of a suite of connected Digital Access Solutions from ASSA ABLOY, now enables management of CLIQÒ programmable smart keys from the same software interface. When businesses extend their SMARTair digital access solution with CLIQ battery-free cylinders, they implement complete oversight for their premises, including any outdoor spaces. There is no cabling and no more need for mechanical keys – just smart, flexible management.

When CLIQ electronic and electromechanical cylinders are deployed within a SMARTair-controlled installation, security teams can manage even more doors. They can implement digital access almost anywhere, without drilling or causing damage to the building structure. The broad range of openings already covered by SMARTair are supplemented with a range of more than 60 CLIQ and eCLIQ cylinder types, making every access point secure. SMARTair’s intelligent TS1000 software manages and monitors every opening and credential, including smart keys and mobile keys if required.

“For healthcare, education, multi-residential properties, and many more types of building, this new integration puts so much more power in your hands,” says Mikel Gaztañaga, Sales Manager at ASSA ABLOY Opening Solutions EMEIA. “Building managers gain transparent oversight over every type of opening, from one familiar software interface. It helps them to meet the growing demands of compliance and to control access much farther into and through their buildings.”

“With this new integration of SMARTair and CLIQ, you make life more convenient for everyone who manages or uses your premises. Facilities teams work smarter and more efficiently. Users enjoy a streamlined, unified experience right from the front door.”

One solution, maximum reach

By bringing CLIQ devices into a SMARTair solution, organizations gain fully integrated control and total traceability of access. They can extend access control even to remote locations with durable CLIQ cylinders and programmable keys, all from the familiar SMARTair TS1000 software interface. In addition, SMARTair’s Wireless online management option gives security teams real-time system control via wireless HUBs. For added convenience, every CLIQ key has an RFID chip inside which can be programmed to unlock authorized doors secured with SMARTair battery-powered devices. Aligning CLIQ with SMARTair gives facilities managers the choice of mobile credentials or RFID credentials (smart cards, fobs or badges) for SMARTair devices, smart keys for CLIQ cylinders or smart keys with RFID tags for both SMARTair and CLIQ devices.

SMARTair and CLIQ in action at a Spanish football stadium

This powerful new integration is already up-and-running at Spanish football club, UD Almería. For their stadium, they chose SMARTair digital access with additional centralized management of CLIQ smart keys and cable-free cylinders. All users and access points are managed online from their SMARTair TS1000 Web software. SMARTair Wireless Online management gives staff real-time control and oversight of offices, locker rooms and physio suites. Stadium staff use customized RFID cards which double as their ID badges. Visitors and external contractors receive time-limited access via mobile keys sent to their own SMARTair OpenowÒ app. It’s convenient for them and simplifies visitor management. CLIQ cylinders protect technical rooms and interior service zones. Maintenance staff and security personnel, including matchday police, carry a programmable CLIQ key with their individual access permissions.

“The complementary benefits of SMARTair and CLIQ ensures Almería’s needs are met without compromising on security or flexibility,” adds Gaztañaga. “This innovative hybrid installation ensures their diverse access needs were met. Only ASSA ABLOY could provide such a connected, unified solution.”

To learn more about SMARTair/CLIQ integration, download a free Solution Guide at: https://assaabloy.com/emeia-blueprint/en/documents/solutions/topics/access-control/smartair/AA_SMARTair-CLIQ-Integration_Brochure_2026-01_EMEIA.pdf

Managing access in education: how and where digitalization makes a positive impact

Across Europe, the Middle East and beyond, schools, colleges and universities look to modernize security while preserving openness. Their duty of care extends to protecting people, property and data, yet education sites must also enable the free movement of staff, students and visitors. At the same time, budgets are tight and expectations for user experience are high. The right access management strategy must reconcile safety, efficiency and cost-effectiveness – and when implemented effectively, can benefit daily operations.

Education sites always host multiple user-groups with different access needs, as well as schedules which shift constantly. Staff, students, contractors and other external users share the same spaces at different times of day. At sites which still rely on mechanical keys, often across large estates, management may be complex and time-consuming.

Lost or duplicated physical keys can expose entire premises to risk and require expensive rekeying. Manually updating permissions for thousands of users is inefficient. Outdated systems and protocols may make it difficult to monitor who is on site or to coordinate a rapid lockdown in an emergency. Facilities teams increasingly seek intelligent access solutions that provide real-time visibility, centralized control and reduced maintenance. An increasingly digital-native user-group, especially students, expects the convenience of digital solutions, including mobile keys stored on their personal smartphone.

Recent data underlines the urgency of a more connected approach to access. UK universities, for example, are at high risk of cyber breach, with perhaps millions of stolen credentials circulating on the dark web*. Such weaknesses illustrate a growing hybrid threat. If a single credential can open both doors and provide access to in-house networks, its compromise endangers the institution’s operations and reputation. To mitigate these risks, mobile digital credentials – instantly revocable, amendable and traceable – can help education facilities teams to close this gap. Reliable, digital physical security and access is now a fundamental building-block of the modern education institution.

The solution is access digitalization

Digitalization offers a coherent way forward. ASSA ABLOY has extensive experience in digitalizing access management for educational buildings, helping these institutions to create a secure, safe and convenient environment for students, teachers and visitors. A vast range of ASSA ABLOY digital solutions can protect people and valuable assets from the perimeter right into the heart of a building, all the way to intelligent locking for server racks which integrates seamlessly with almost any access management software. Schools and universities can choose to manage access rights on-premise, via a secure cloud, or with a choice of Software as a Service packages.

For security and facilities managers, programmable locks and credentials boost the responsiveness and efficiency of access management. Lost or stolen cards can be deactivated with a click, preventing unauthorized entry without the expense and hassle of replacing hardware. Rights are issued, amended or withdrawn remotely, backed by a full audit trail. Digital access also enhances flexibility. Smartphone or smart-card credentials can be configured for specific areas and time windows, supporting after-hours study or revenue-generating rentals, while maintaining control, for example. Facilities managers gain oversight across multiple buildings and can administer access off-site through intuitive software. The outcome is safer, more adaptable premises and a significant reduction in administrative effort – and therefore, costs.

For staff and students, the convenience and security of a digital credential gives them the peace of mind to move about the premises in safety and comfort.

European standards and regulation also support this digital shift. EN/IEC 60839 sets functional and interoperability requirements for digital access systems, while EN 179 and EN 1125 specify safe egress for emergency exits. GDPR ensures personal and credential data are handled transparently, and biometric use is governed by national consent laws such as France’s CNIL or the UK Protection of Freedoms Act. In addition, the EU’s NIS2 Directive is bringing many academic research locations under its scope, obliging them to strengthen both digital and physical protections in line with the directive’s “all-hazards” approach to connected security. Institutions that fail to comply risk financial penalties, another clear incentive to modernize access infrastructure.

In this regulatory environment, investment to meet these evolving challenges is building. The European school and campus security market was valued at around EUR 0.92 billion in 2025, and continues to expand as educational facilities modernize and further digitalize access.

The impact of digitalization can be quick and significant, as these three real-world cases illustrate.

1. Staff and student security as the priority

For The Camp, a business-education provider based near Aix-en-Provence, France, security had to match its culture of innovation. Their site has offices, event areas, kitchens and on-site accommodation operating around the clock. Safety for a constantly changing population of residents and visitors required an access system able to adapt in real time.

Aperio® wireless devices are integrated with TIL Technologies’ platform to simplify management of access to the entire campus from a single interface. Permissions are updated instantly as staff, students and guests arrive or depart. Lost credentials are cancelled and reissued on demand. Defined profiles segment access to areas such as meeting or server rooms, keeping valuable assets secure even during busy events. Wireless devices also align with The Camp’s sustainability goals. Battery-powered operation reduces energy consumption compared with hard-wired systems and preserves the site’s architectural aesthetic. Security, flexibility and environmental responsibility work together.

2. Digitalizing key management for efficiency

At Vejle Friskole in Denmark, maintaining mechanical keys had consumed several hours each week. Lost keys caused disruption, and tracking who had access to which rooms was an onerous task.

The school installed SMARTair® wireless digital access system, an out-of-the-box solution managed with straightforward software. Each teacher and student carries a programmed fob with individual permissions. When a credential goes missing, administrators simply update digital rights, instead of changing cylinders – saving money and time. This simple change has transformed daily administration. Security management now takes minutes rather than hours, freeing security staff time for other responsibilities. The system also supports flexible building use outside school hours, allowing safe access for events without adding workload or risk. For smaller schools without dedicated security staff, SMARTair provides an accessible, easily scalable route to digitalization.

3. Cutting costs and risk from lost keys

In Villiers-le-Bel, near Paris, the financial impact of lost keys could run to thousands of euros per incident. Staff at the Municipal Technical Centre carried multiple keys for different sites; when one went missing, entire suites of locks required replacement. Administrators digitalized with CLIQ® electromechanical locking cylinders and programmable keys. Using the CLIQ Web Manager software, lost keys are now cancelled immediately and new permissions issued remotely. Each programmable key stores the user’s specific access rights, replacing dozens of physical keys with one secure, flexible credential.

The new system has reduced both cost and complexity. Staff no longer collect keys from a central office, and administrators monitor access across schools and other municipal buildings via a standard web browser. It enhances protection for sensitive sites while keeping the solution scalable and within budget.

Towards smarter, safer campuses

The education sector’s digital transition is accelerating, in both learning delivery and facilities management. Rapid change in access is being driven by a need for operational efficiency; national and regional regulations and compliance; and the fast-evolving risk landscape. NIS2 adds further urgency specifically at universities where sensitive research is conducted. Whether in a small primary school or a multi-site university, wireless and intelligent-key technologies enable cost-effective control across every opening.

Hybrid cyber–physical threats highlight the importance of secure credential management, for example: Microsoft estimate that more than 40% of UK universities face attack on a weekly basis. Mobile digital credentials, quickly and remotely cancelled if lost or compromised, are one powerful defence. Integrated, standards-based digital access at schools and universities across the EMEIA region can underpin not only compliance, but also the trust and flexibility essential to delivering education’s mission.

To learn more about Digital Access Solutions from ASSA ABLOY, visit www.assaabloy.com/group/emeia/solutions/topics/access-control

 

ICT: Different Ways to Upgrade to Smart Access Control

Many buildings and sites are running on access control and intrusion detection technology that is ten, maybe even fifteen years old. The hardware is still functional, doors open, alarms are set, but these legacy systems often act as roadblocks when a client wants to modernise their building management or bring new applications onboard.

The need for change is usually driven by compliance, security, or sustainability targets. However, like every infrastructure project, it had to be financed and the cost: the Capital Expenditure (CAPEX) will define the feasibility and timeline of the new access control installation. Fortunately, upgrading doesn’t always have to be an “all-or-nothing” scenario.

How does access control improve operational efficiency?

Beyond enhancing security, modern access control is an enabler for operational efficiency and energy savings.

By unifying various systems into one central platform, customers can see a direct impact on their bottom line. For instance, an open access control system can automatically switch off air conditioning if a window is left open or turn off lights and arm an area, when no one is present.

In high-traffic environments, integrating the access control platform with turnstiles and lift systems, manages the flow of people badging in and directs them to the fastest lift for their destination. Saving a few minutes for thousands of people everyday amounts to significant productivity gains.

Is a full system replacement always necessary?

For new builds or extensions, a brand-new system is standard. But for retrofits on a tight budget, a full “rip and replace” isn’t the only option.

A smarter approach is a phased migration. A thorough assessment of the existing infrastructure will determine whether legacy equipment is compatible with modern controllers. This allows to upgrade the “brains” of the system while keeping the existing cabling and peripheral hardware.

Phased migration as the one offered by ICT decreases project costs and lowers the risk of disruption, a huge benefit if the organisation operates 24/7. The customer gets immediate access to new functionalities and third-party integrations supported by platforms like Protege GX, while the initial capital investment remains manageable.

How to ensure continuity during migration?

If a legacy system is running alongside a new one, how are the users managed? Is there a risk of database mismatch?

The critical point is ensuring the legacy and new access control servers are constantly synchronising data to avoid discrepancies in the user database which could lock people out or leave areas unsecured. ICT offers DataSync software specifically for this purpose, ensuring a seamless transition.

What financial factors should be considered?

The decision about which technology to select impacts not just the initial CAPEX, but the ongoing Operational Expenditures (OPEX).

Customers should understand the licensing models. Are there any recurring fees, is the cost capped over a certain number of licenses? They should know aboout the structure of the maintenance cost and upgrade cost.

Choosing an open technology that integrates with legacy equipment and third-party solutions offers financial protection. It means the system can scale and adapt to new requirements without needing another expensive overhaul in a few years.

Access control is a central pillar between security and operations. By helping organisations navigate the balance between necessary upgrades and available capital, it helps create a successful and affordable solution.