Access trends for 2026

SMART Access & Identity 2026 Editor's Choice, Access Control & Identity Management, Infrastructure

The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. From only allowing authorised people into buildings and specific rooms within the buildings, through to deciding who has access, to what digital resources, access and identity, whether via cards, passwords, biometrics or multi-factor devices, is key to our everyday lives, both at work and at home (who wants other people sniffing through their smartphone?).

While there are always trend articles released at the beginning of the year, the people who know best what is happening in the market are those who are involved in it every day. In this article, SMART Security Solutions asked four individuals for their take on what we can expect this year, from the perspective of their businesses – system integrators, distributors, etc.

We asked all four the same questions, with the editorialised answers below. The questions we asked were:

1. How do you see the traditional access control market changing over the next year or two? Will AI have a big impact on the access & identity market, and how do you see this playing out?

2. Are local end users adopting cloud systems, or are they still looking at on-premises or hybrid systems?

3. What do end users want from their service providers (product and integration providers)?

4. On the digital side of the world, there is a lot of talk about passwordless access using FIDO standards (for example), as well as endless discussion of digital identities. Do you see this happening in Africa, and what challenges may hinder the process?


Frazer Matchett, MD of Enkulu Technologies.

As systems collect more and more data, I foresee data presentations becoming more focused. We see the need for more real-time information so that users of the systems can correctly assess, process, and act on the data. I note the use of some AI systems that help eliminate ‘white noise’ to present clean, concise data.

While we appreciate the presence of cheaper brands and products, we see more customers returning to premium systems with better after-sales support. The COVID-era of cheap ‘make-a-plan’ systems is now being replaced by thought-out solutions that no longer just tick the box.

Integration is certainly requested more, and the brands we focus on are promoting a resilient, secure API with clear documentation. Our internal support team assists customers in integrating their systems with ease so that each customer can offer a unique experience to their own customers. This can range from simple integrations, such as automated exports of transactional data, to high-level calculations that process information from cloud-based services that require top-tier cyberthreat mitigation. No longer is an access control system simply opening the door; it is part of a larger system that ties many aspects of a business together.

Cloudy or clear?

Enkulu offers on-premises, cloud, and hybrid solutions, yet we still sell more on-premises systems at an estimated ratio of 10:1. Hybrid systems are certainly gaining more steam in the access control environment; however, South Africans still have a deep-rooted fear of putting their access control systems in the cloud.

We are already seeing AI used actively for report data processing, and we have a couple of our own integrations that leverage AI to further enhance the quality of the data we process for them. AI integrations will only grow.

What do end users want?

As systems become more complex, end users want the confidence that their system will work and not be compromised. Users expect their service providers to act with integrity and follow industry standards, so simply following these guidelines will be a key step to retaining the relationship. Users expect that the service provider will ‘know everything’ as they are the professionals, so providing sound professional advice is key to educating about the limitations of the systems they are providing. We see far too often that a service provider sells a solution that is simply beyond the scope of what the end user requests or understands.

Digital identity on the cards?

We love the idea of digital identities; however, we believe that the greater Africa is not quite ready for the transition to this medium, though we see it being accepted in more affluent areas. We already see the ‘normalisation’ of handing over our driver’s licences and ID cards to security guards at gated communities, so I am confident that we will get the normalisation of the digital identity ironed out in the foreseeable future.

As for the challenges in rolling this out, it is all about educating end users about these credentials and their use. Modern smartphones are certainly making the deployment of these credentials easier, as manufacturers are making features like NFC and biometric access standard.

Rivash Raghubir, MD of RR Electronic Security Solutions

Over the next few years, the traditional access control market is poised for significant transformation. It is increasingly recognised that access control systems are no longer limited to the basic function of opening doors; they are evolving into valuable data resources that can provide insights and streamline operations.

Key shifts in access control I expect to see include:

Integration across systems: End users are seeking greater integration capabilities. Modern access control systems must communicate seamlessly with other technologies. For instance, when an employee swipes their access card, it should trigger multiple responses: activating lights, adjusting HVAC settings, and notifying HR of their presence. This kind of integration enhances operational efficiency and improves the overall user experience.

Demand for data: Users are increasingly interested in the data generated by access control systems. They want actionable insights that can inform security strategies and operational decisions. The ability to analyse access patterns can help organisations optimise their resources and improve security protocols.

Cybersecurity concerns: While I may not be a cybersecurity expert, it is clear that many customers are wary of cloud-based systems. Concerns surrounding monthly costs and potential security vulnerabilities are driving this hesitation. As a result, there is a growing preference for on-premise solutions that provide greater control over sensitive data.

In conclusion, the emphasis is shifting towards systems that offer comprehensive integration and valuable data insights, while addressing the critical concerns surrounding cybersecurity. Organisations are looking for solutions that not only enhance security, but also improve overall operational efficiency.

Cloudy or clear?

The current landscape for access control systems resembles a tug-of-war between cloud adoption and traditional solutions. Despite the growing hype around cloud technologies, many local end users continue to prefer on-site dedicated PCs or servers.

Preference for on-premises solutions: A significant number of clients are price-sensitive and prioritise control over their data. This desire for data sovereignty is driving many to opt for on-premises systems, where they feel they have greater security and oversight.

Cloud adoption challenges: Even with the advantages cloud solutions offer, such as scalability and remote access, local users remain hesitant due to concerns about data privacy and ongoing costs

Potential for mobile integration: Introducing mobile options could bridge the gap between traditional systems and cloud solutions, offering users more flexibility, while still allowing them to maintain control over their data.

AI may not have a transformative impact on traditional access control systems in the immediate future, but it certainly holds promise in enhancing various aspects of the industry.

Smart assistants powered by AI can significantly improve operational efficiency within access control systems. By analysing data patterns, AI can enhance reporting capabilities and provide valuable insights that help organisations make informed decisions. This positions companies leveraging AI ahead of their competitors.

The integration of facial recognition technology with CCTV systems can elevate security measures and streamline operations. AI can facilitate real-time analysis of video feeds, enabling quicker responses to potential security threats and improving overall situational awareness.

AI can also assist in optimising operational flow by identifying usage patterns and predicting access needs. For instance, it could automate processes such as scheduling or resource allocation, ensuring that facilities operate smoothly and efficiently.

What do end users want?

At the core of their needs, end users seek reliability and responsiveness from their service providers, whether they are product or integration providers.

Reliable systems: End users want access control systems that function seamlessly without unnecessary complications. They expect technology that is intuitive, efficient, and effective in meeting their security needs. A system that delivers consistent performance is crucial to maintaining trust and satisfaction.

Immediate support: Availability of support is paramount. End users desire service providers who are responsive and can address issues promptly, regardless of the time or day. They appreciate a proactive approach in which providers not only resolve problems swiftly, but also anticipate potential challenges before they escalate.

Transparent communication: Clear and open communication is essential. End users want to be kept informed about system updates, potential issues, and best practices for maximising their systems’ effectiveness. This transparency builds a stronger partnership and fosters trust between users and providers.

Customisation and integration: End users also seek solutions tailored to their unique needs. Integration with existing systems is crucial, as users want a cohesive ecosystem that enhances operational efficiency. Providers who can offer customised solutions and smooth integration processes will stand out in the market.

Digital identity on the cards?

The concept of passwordless access, particularly through standards like FIDO, is certainly gaining attention, but its widespread adoption in Africa is likely to take time.

Emerging technologies: In South Africa, we are beginning to see traction with technologies such as NFC (Near Field Communication) and Bluetooth, particularly in the context of bank cards and loyalty programs. These advancements indicate a willingness to explore more secure and convenient authentication methods.

Challenges to adoption: Despite these developments, several challenges may hinder the rapid adoption of passwordless access and digital identities across the continent. These include infrastructure limitations, cultural and behavioural factors, and regulatory and security concerns.

While it may not happen in the immediate future, the potential for passwordless access and digital identities in Africa is certainly there. As technology continues to evolve and infrastructure improves, we will gradually see a shift towards these modern solutions.


Walter Rautenbach, MD of neaMetrics.

Convergence, integration and cloud have been the industry’s favourite buzzwords for years, with AI the latest addition to that well-worn list. The good news is that over the past year, we have seen real momentum, with these concepts finally moving beyond clichés, with AI acting as a key enabler. What has become clear is that these ideas are inseparable; in many cases, they describe the same outcome from different angles.

Access control is no longer about devices or managing doors. Access and video data are now recognised as rich sources of operational intelligence. We are seeing intelligent video more tightly integrated with access control, deeper alignment with cybersecurity frameworks, and a growing demand for a unified security view across broader business operations.

Expectations have been set. AI has demonstrated what is possible and has moved beyond being a brochure talking point. End users have noticed, and their expectations are rising accordingly. Those who succeed will be the ones who can genuinely merge data and systems to deliver this new standard of intelligent, integrated security.

As far as AI is concerned, it is already having a significant impact on access and identity, but it remains a tool, not a replacement for human decision-making. Its real value lies in accuracy, consistency and scale. By reducing false positives, human error and operational noise, AI improves confidence in security decisions.

AI is improving biometric accuracy and enabling behavioural detection and event correlation across access and video systems. It can also act as an integration layer, making sense of data from multiple systems and presenting it in a more unified, actionable way. This moves integration beyond basic data exchange toward contextual understanding, where events across systems can be correlated and prioritised automatically.

That said, AI only adds value when it is applied with purpose. In security environments, complexity is already high, and AI should reduce operational load rather than introduce yet another layer to manage.

Cloudy or clear?

Cloud adoption locally is no longer a foreign concept, but it is not a default either. What we see most often is a requirement for choice, allowing organisations to balance flexibility and scalability, and to migrate at a pace that matches business readiness. For many end users, the decision is less about technology preference and more about trust, uptime, skills and operational continuity.

End users are comfortable using cloud services where it makes sense, such as centralised management, visibility across sites, remote access and analytics, but they are equally clear about where control needs to remain local. In mission-critical security environments, blindly moving everything off-site is simply not realistic. The result is a pragmatic, phased approach rather than an all-or-nothing decision.

Our role is to give businesses that flexibility by supporting on-premise, cloud and hybrid architectures. The ability to design systems with centralised or edge-based intelligence makes it easier for organisations to decide what runs where, and to evolve their architecture over time.

What do end users want?

End users are no longer looking for product suppliers or installers; they are looking for partners who understand their environment and take responsibility beyond deployment. As access and identity systems become more integrated and central to operations, value shifts from the technology itself to how well it is designed, implemented and supported over time.

What customers want most is honest guidance. They expect service providers to work with what already exists, plan realistic migration paths and avoid forcing rip-and-replace approaches. Integration is rarely clean, and requirements change, so providers need to stay engaged as systems evolve.

Ultimately, trust matters more than specifications. Providers who can simplify complexity, communicate clearly and stand behind their decisions are the ones end users continue to rely on.

Digital identity on the cards?

Africa should not be underestimated. The continent showed leadership in digital and biometric identity as early as the early 1990s, when many other regions had not yet seriously engaged with digital identity. At the same time, Africa has proven to be a pragmatic adopter of global trends, often applying them in ways that fit local realities and scale.

Passwordless access and digital identity are real, but they are not arriving as a single, uniform or overnight shift. Adoption looks different depending on the country, sector, and level of risk involved. In enterprise environments, we are already seeing movement toward passwordless access and stronger digital identity models, largely driven by usability, improved security and the need to reduce credential fatigue.

Where progress tends to slow is not the technology itself, but trust and governance. Digital identity only works at scale when trust is designed into the system — through strong frameworks, secure data exchange and clear governance. These questions do not disappear simply because new standards emerge. For that reason, physical and digital identity are likely to coexist for some time, often combined through hybrid models that blend biometrics, mobile credentials and traditional access methods.

Rather than trying to leap straight into fully digital, passwordless environments, most organisations are better served by building on what already works and allowing identity to evolve as part of a broader, trusted access and security infrastructure. The same principles increasingly apply to access control, where trust, interoperability and resilience must be built into the platform rather than managed through policy alone.


Wouter Du Toit, sales director Africa, Smart Biometrics, IDEMIA.

Access control is rapidly moving from just opening doors to an identity-centric platform. In Africa, mid to enterprise organisations are looking for connected, intelligent systems that deliver real value and meaningful data. They want more than basic entry logs; they want meaningful insight into who is accessing their environments and how that access connects to security operations, facilities management, HR and broader business processes. Identity management is becoming the foundation of modern access control.

Once an identity can be trusted, integration across physical and digital systems becomes simpler, more secure and easier to manage (expect more emphasis on trusted identities). At the same time, awareness around cybersecurity and data protection has grown significantly, and customers now expect these to be built into solutions from the start. As a result, access control is increasingly seen as a key cornerstone for both physical and logical identity management, with a strong emphasis on delivering a frictionless user experience.

AI is already part of everyday access and identity solutions, even if users do not always realise it. It helps improve biometric accuracy, reduces errors, and adds intelligence to how access events are analysed. In our market, AI will increasingly be used to spot unusual behaviour, improve security decisions and automate processes. Over the next few years, AI will quietly become the norm rather than something seen as new or experimental.

Cloudy or clear?

Cloud adoption is growing, especially for visitor and workforce management solutions. South Africa is a bit slower than other regions, as cost and comfort with existing on-premises systems remain factors. Hybrid setups are common, with some systems staying on-site while others gradually move to the cloud.

What do end users want?

End users want guidance and clarity. They want to understand where the market is going and how today’s investments will still make sense tomorrow (longevity/futureproof). From an OEM and integration perspective, they look for proven technology, strong local support, and the ability to integrate with existing systems. Flexibility is also important. Customers want solutions that can grow with them, not force costly replacements. Demonstrated integrations and clear service commitments are essential.

Digital identity on the cards?

Yes, very much so, especially in mid to large-scale organisations. Passwordless access and digital identity are gaining traction because they improve security while making access easier for users. Identity management should be the starting point to build trust, and biometrics plays a key role in that process. Challenges still exist, such as legacy systems and varying levels of digital readiness, but the direction is clear, and adoption is steadily increasing across the region.


Credit(s)









Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.