Ask the Expert – Sarah Thompson, ICT

Security Buyer sits down with Sarah Thompson, Chief Product Officer at ICT to discover more about the company who pioneered ‘unified systems’ 

Please introduce yourself and give a brief insight into Integrated Control Technology (ICT)? 

I’m Sarah Thompson, Chief Product Officer at ICT (Integrated Control Technology). With a background in strategy, business transformation, and executive leadership, I’ve spent my career focused on building impactful products at global tech companies that truly make a difference.   

ICT has been a pioneer in security solutions for over 20 years. Back when “unified systems” weren’t the buzzwords they are today, we were already leading the way with innovative access control, intruder detection, and building automation technologies.   

What drew me to ICT is its mission: not just protecting people and property, but creating a world where safety is something you can truly feel. 

How would you address the perception of access control readers being a “grudge” purchase, and what role do they play as a critical component of a security system? 

I can see how some might perceive it as a “grudge” purchase – they can be bulky and obtrusive and at their most basic can be thought of as a fancy lock. But when an access reader is part of a full access, security and building automation system is one of the most important parts of the system. The reader not only allows or denies access, but they create a comprehensive reporting system that lightens day-to-day workloads and allows for faster responses in an emergency. They can be used to trigger duress signals to authorities without the need for audible alarms that may cause an intruder to become reckless or to leave before being apprehended. They can also increase awareness and operational efficiency when you have a reader that has a LED strip like ICT’s giving you instant status updates based on the colour of the strip.  

In terms of security, how does ICT ensure its readers are resilient to modern threats, such as tampering or unauthorised access? 

At its core, ICT is an access and security company, so our devices are built with the leading designs in security. From protocols like OSDP 2.2 to functions like signed firmware updates and use of a secure access module – which isolates authentication, encryption, and decryption processes within the reader – which will be available in our upcoming TSL line, we ensure our access readers are built to withstand the ever-changing security landscape. That’s why you’ll always see us pushing for smart cards or mobile credentials – while a prox card may be easy, it’s the least secure solution you can have.  

How important is credential compatibility in access control systems, especially for large sites with existing cards or tags, and how does ICT address this challenge? 

It’s definitely one of the things we hear about most from people who want to move from their existing access system to Protege – ‘can I bring my card with me?’ Which is not a surprise at all. The cost and time to replace credentials is a real barrier for a lot of businesses looking to come onto a modern, comprehensive system. We understand the pain this can entail. That’s why our readers are set up to read a wide variety of credentials, from low security proximity credentials like iClass dual/13.56, GProx, HID Corp1000, Indala to smart MIFARE DESFire EV1-3. 

Can you explain the cost-saving and operational benefits of ICT readers being compatible with a wide range of credentials and technologies? 

Think about a company that has 300 employees and imagine not only the cost, but the amount of work required to replace all the cards. Interrupting everyone’s workday, then having to deactivate every single card. 

If a company uses prox. cards, we of course always recommend moving to a smart card due to the high vulnerabilities that come from low-tech cards. But we understand the difficulties of doing this all at once, which is why our dual-technology readers can read both low and high frequencies, there’s a built-in path that makes it easy to move to a more secure access solution at your own pace. 

Could you share examples of how ICT readers have been used to provide operational efficiencies? 

We actually recently had an amazing opportunity to help an innovative self-service hotel in Iceland – Hótel Hálönd. Our local dealer, Securitas Iceland, took up the challenge and were able to create a completely automated system by integrating Protege GX, our access readers, and their reservation system. 

At Hótel Hálönd, the integration syncs customer bookings and hotel access rights so when guests are confirmed, access codes are automatically sent within 15 minutes. It also ensures that PINs are only usable for the booking period and deleted when guests leave. The Keypad Readers connected to each door means that each unique guest PIN can be used to access different areas like guest rooms and the ski/bike equipment storage. Overall, the automated solution cuts costs for the hotel which are then passed along to customers. 

What are the benefits of incorporating keypad functionality into access readers, and how can this enhance security and flexibility for end-users? 

We’re all human right? We leave our card or tag at home or forget to charge our phones. Having a keypad offers the flexibility for users to still gain access. By setting up permissions so that users can use their credential or a PIN, there’s no need to wait for someone else to let you in or to call up your security team. 

You can also use a keypad to set up two-factor authentication for high-security areas, meaning users need both their credential – whether that’s their phone or their card – and a PIN to gain access to an area.  

Read more exclusives and news in our latest issue here.

Never miss a story… Follow us on:
LinkedIn: Security Buyer
Twitter (X): @SecurityBuyer
Facebook: @Secbuyer

Media Contact
Rebecca Morpeth Spayne,
Editor, Security Portfolio
Tel: +44 (0) 1622 823 922
Email: [email protected]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Big Interview Abdullah Tanoli

Big Interview – Hero of Leicester Square

Rebecca Spayne of Security Buyer has the privilege of speaking with a real-life hero, Abdullah Tanoli, the hero of Leicester Square..
Altronix - Security Buyer

Altronix POE367 Delivers 277VAC Support

Altronix has expanded its power product line with the new POE367 power supply/charger designed specifically for 277VAC input environments.
IFPO x GSA - Security Buyer

New Corporate Members for IFPO

The Global SecurAlliance (GSA)summer meeting on 16 June was held again at the stunning Château de Méry-sur-Oise on the outskirts of Paris.
SB Awards register now advert - Security Buyer

Launching Security Buyer Awards

Honouring innovation, leadership, and success across the global security industry at the Security Buyer Judges’ and Readers’ Awards 2025 
Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
ASIs international

ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards.
Gallagher Security and Yusuf Bin Ahmed Kanoo Company Limited sign MOU in Riyadh

Gallagher Security MOU with Yusuf Bin Ahmed Kanoo Company

Gallagher Security is proud to announce the signing of a Memorandum of Understanding (MOU) with Yusuf Bin Ahmed Kanoo Company…
Mike Hurst - Security Buyer

Zygal appoints Mike Hurst CPP CPOI

Zygal, which produces cutting edge AI cloud VMS and monitoring solutions for connecting, managing, and monitoring assets…
Scroll to Top