28 January 2025

Sarah Thompson, ICT

Ask the Expert – Sarah Thompson, ICT

Security Buyer sits down with Sarah Thompson, Chief Product Officer at ICT to discover more about the company who pioneered ‘unified systems’  Please introduce yourself and give a brief insight into Integrated Control Technology (ICT)?  I’m Sarah Thompson, Chief Product Officer at ICT (Integrated Control Technology). With a background in strategy, business transformation, and executive leadership, I’ve spent my career focused on building impactful products at global tech companies that truly make a difference.    ICT has been a pioneer in security solutions for over 20 years. Back when “unified systems” weren’t the buzzwords they are today, we were already leading the way with innovative access control, intruder detection, and building automation technologies.    What drew me to ICT is its mission: not just protecting people and property, but creating a world where safety is something you can truly feel.  How would you address the perception of access control readers being a “grudge” purchase, and what role do they play as a critical component of a security system?  I can see how some might perceive it as a “grudge” purchase – they can be bulky and obtrusive and at their most basic can be thought of as a fancy lock. But when an access reader is part of a full access, security and building automation system is one of the most important parts of the system. The reader not only allows or denies access, but they create a comprehensive reporting system that lightens day-to-day workloads and allows for faster responses in an emergency. They can be used to trigger duress signals to authorities without the need for audible alarms that may cause an intruder to become reckless or to leave before being apprehended. They can also increase awareness and operational efficiency when you have a reader that has a LED strip like ICT’s giving you instant status updates based on the colour of the strip.   In terms of security, how does ICT ensure its readers are resilient to modern threats, such as tampering or unauthorised access?  At its core, ICT is an access and security company, so our devices are built with the leading designs in security. From protocols like OSDP 2.2 to functions like signed firmware updates and use of a secure access module – which isolates authentication, encryption, and decryption processes within the reader – which will be available in our upcoming TSL line, we ensure our access readers are built to withstand the ever-changing security landscape. That’s why you’ll always see us pushing for smart cards or mobile credentials – while a prox card may be easy, it’s the least secure solution you can have.   How important is credential compatibility in access control systems, especially for large sites with existing cards or tags, and how does ICT address this challenge?  It’s definitely one of the things we hear about most from people who want to move from their existing access system to Protege – ‘can I bring my card with me?’ Which is not a surprise at all. The cost and time to replace credentials is a real barrier for a lot of businesses looking to come onto a modern, comprehensive system. We understand the pain this can entail. That’s why our readers are set up to read a wide variety of credentials, from low security proximity credentials like iClass dual/13.56, GProx, HID Corp1000, Indala to smart MIFARE DESFire EV1-3.  Can you explain the cost-saving and operational benefits of ICT readers being compatible with a wide range of credentials and technologies?  Think about a company that has 300 employees and imagine not only the cost, but the amount of work required to replace all the cards. Interrupting everyone’s workday, then having to deactivate every single card.  If a company uses prox. cards, we of course always recommend moving to a smart card due to the high vulnerabilities that come from low-tech cards. But we understand the difficulties of doing this all at once, which is why our dual-technology readers can read both low and high frequencies, there’s a built-in path that makes it easy to move to a more secure access solution at your own pace.  Could you share examples of how ICT readers have been used to provide operational efficiencies?  We actually recently had an amazing opportunity to help an innovative self-service hotel in Iceland – Hótel Hálönd. Our local dealer, Securitas Iceland, took up the challenge and were able to create a completely automated system by integrating Protege GX, our access readers, and their reservation system.  At Hótel Hálönd, the integration syncs customer bookings and hotel access rights so when guests are confirmed, access codes are automatically sent within 15 minutes. It also ensures that PINs are only usable for the booking period and deleted when guests leave. The Keypad Readers connected to each door means that each unique guest PIN can be used to access different areas like guest rooms and the ski/bike equipment storage. Overall, the automated solution cuts costs for the hotel which are then passed along to customers.  What are the benefits of incorporating keypad functionality into access readers, and how can this enhance security and flexibility for end-users?  We’re all human right? We leave our card or tag at home or forget to charge our phones. Having a keypad offers the flexibility for users to still gain access. By setting up permissions so that users can use their credential or a PIN, there’s no need to wait for someone else to let you in or to call up your security team.  You can also use a keypad to set up two-factor authentication for high-security areas, meaning users need both their credential – whether that’s their phone or their card – and a PIN to gain access to an area.   Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Ask the Expert – Sarah Thompson, ICT Read More »

Gallagher

Gallagher Security Asia achieves sustainable recognition

Global security manufacturer, Gallagher Security, celebrated a double award win at the Greater Bay Area Social and Governance (ESG) Achievement Awards 2024 in North Point, Hong Kong on 23rd September 2024. Gallagher Security received the Recognized Sustainable Development Corporate Certificate as a testament to their dedication towards embedding environmental, social, and governance (ESG) principles into business operations. In addition, Gallagher Security has also been awarded the Green Sustainable Development Award, further highlighting a commitment to sustainable practices across business operations and innovation. Joe Fan, Gallagher Security Regional Marketing Manager – Asia says: “The Greater Bay Area ESG Achievement Awards 2024 serve as a vital platform to inspire companies to embrace sustainability as a core value. We are proud to be recognized for our efforts and remain committed to driving positive change within the business community.” These awards recognise companies that demonstrate excellence in integrating ESG principles into their business strategies, while contributing to the broader goals of sustainable development. They closely align with the United Nations’ 17 Sustainable Development Goals (SDGs), encouraging corporations to achieve growth and profitability while creating shared value for society and protecting the environment. This emphasizes the need for businesses to meet present needs without compromising the ability of future generations to thrive. Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Gallagher Security Asia achieves sustainable recognition Read More »

Samir Cherif

The Innovator – Samir Cherif

Samir Cherif, Senior Director MEA at HID, discusses sustainable solutions, mobile credentials, and emerging technologies shaping access control in the Middle East and Africa with Rebecca Spayne of Security Buyer. HID has a unique approach of working directly with end users and consultants. How does that benefit your research, development, and innovation efforts?  That’s a great question. HID’s DNA—and I’m including the larger group we belong to, ASSA ABLOY—emphasises upfront product specification with the end client. While we don’t sell directly to end users, we evangelise technology at the end-user level. Then, we collaborate with consultants to align ecosystem requirements with what clients want.  This proactive approach helps set the standards for access control products and trends. Ultimately, our channel partners close the business, but our efforts indirectly create demand by educating and aligning expectations. This approach also allows us to gather direct insights into end-user pain points, which feeds back into innovation. It’s a model that works because, as a global leader in access control, we have the resources to prioritise thought leadership over direct selling.  HID has made significant strides in sustainability, such as the bamboo key cards. How does sustainability fit into your manufacturing processes and corporate values?  At HID, sustainability isn’t just a compliance issue—it’s an integral part of our ethos. ASSA ABLOY has adopted ambitious ESG thresholds that actively drive our approach to sustainable development. For example, even when we use plastics, we choose materials with a lower carbon footprint, a practice we embraced even before sustainability gained momentum globally.  Sustainability is embedded across our operations—from manufacturing plants to the products we create. We also advocate for sustainability with our clients, emphasising eco-friendly practices throughout the value chain. Because our focus is on consultants and end clients, this message resonates well. Governments and organisations in this region are increasingly prioritising sustainability, and our efforts align with their goals.  Mobile access credentials are gaining traction worldwide. How does adoption in the Middle East and Africa compare to other regions?  The trend in the Middle East and Africa is similar to other regions, though the scale and pace differ. Markets like North America and Europe have a more significant uptake of mobile access due to their maturity and established ecosystems. The Middle East, while forward-looking, has deep-rooted practices that sometimes slow the transition to newer technologies.  That said, mobile access is growing rapidly here. Though starting from a smaller base, the adoption rate is doubling annually. Projections suggest mobile credentials could account for 20% of all credentials in five years. It’s not just about replacing physical cards but aligning with a broader strategic shift towards mobile solutions and related services.  Does the growing emphasis on user-friendly security influence technology adoption in the region?  Absolutely. There’s a global move towards seamless security, where users feel less like they’re navigating barriers and more at ease while still being protected. In regions like the UAE, there’s a balance between offering a flexible, welcoming environment and ensuring robust security.  For example, mobile credentials are ideal for events like the World Cup in Qatar or exhibitions in Dubai. They offer flexibility, user-friendliness, and enhanced security. While the technology makes processes smoother, the underlying security remains paramount. The shift towards mobile access is about offering a more intuitive experience without compromising safety.  Saudi Arabia is making significant strides in digitisation. How does HID align with these efforts?  Saudi Arabia is indeed at the forefront of digital transformation, particularly in areas like digital IDs for both citizens and visitors. The adoption of these technologies isn’t optional; it’s mandatory as part of their national vision. This aligns perfectly with HID’s capabilities in providing scalable, secure, and sustainable solutions.  As digital IDs become more prevalent, the region is setting benchmarks for how technology can be leveraged for both security and convenience. HID’s focus on mobile credentials and digital solutions positions us well to support these initiatives.  With the rise of digitisation, what challenges are you facing in the Middle East, particularly around cybersecurity?  Cybersecurity is one of the biggest concerns for security managers in this region. The convergence of physical and IT security presents complexities in integrating systems while maintaining robust safeguards. For instance, transferring secure elements from physical credentials to virtual IDs requires meticulous design to prevent vulnerabilities.  The good news is that mobile credentials, by nature, are more secure. Phones often have passwords or biometric locks, and HID incorporates multi-factor authentication into virtual IDs. Our secure identity elements make virtual credentials highly secure and tamper-proof. However, as we integrate more systems, the complexity of managing these integrations becomes a challenge.  Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The Innovator – Samir Cherif Read More »

Scroll to Top