The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. From only allowing authorised people into buildings and specific rooms within the buildings, through to deciding who has access, to what digital resources, access and identity, whether via cards, passwords, biometrics or multi-factor devices, is key to our everyday lives, both at work and at home (who wants other people sniffing through their smartphone?).
While there are always trend articles released at the beginning of the year, the people who know best what is happening in the market are those who are involved in it every day. In this article, SMART Security Solutions asked four individuals for their take on what we can expect this year, from the perspective of their businesses – system integrators, distributors, etc.
We asked all four the same questions, with the editorialised answers below. The questions we asked were:
1. How do you see the traditional access control market changing over the next year or two? Will AI have a big impact on the access & identity market, and how do you see this playing out?
2. Are local end users adopting cloud systems, or are they still looking at on-premises or hybrid systems?
3. What do end users want from their service providers (product and integration providers)?
4. On the digital side of the world, there is a lot of talk about passwordless access using FIDO standards (for example), as well as endless discussion of digital identities. Do you see this happening in Africa, and what challenges may hinder the process?

Frazer Matchett, MD of Enkulu Technologies.
As systems collect more and more data, I foresee data presentations becoming more focused. We see the need for more real-time information so that users of the systems can correctly assess, process, and act on the data. I note the use of some AI systems that help eliminate ‘white noise’ to present clean, concise data.
While we appreciate the presence of cheaper brands and products, we see more customers returning to premium systems with better after-sales support. The COVID-era of cheap ‘make-a-plan’ systems is now being replaced by thought-out solutions that no longer just tick the box.
Integration is certainly requested more, and the brands we focus on are promoting a resilient, secure API with clear documentation. Our internal support team assists customers in integrating their systems with ease so that each customer can offer a unique experience to their own customers. This can range from simple integrations, such as automated exports of transactional data, to high-level calculations that process information from cloud-based services that require top-tier cyberthreat mitigation. No longer is an access control system simply opening the door; it is part of a larger system that ties many aspects of a business together.
Cloudy or clear?
Enkulu offers on-premises, cloud, and hybrid solutions, yet we still sell more on-premises systems at an estimated ratio of 10:1. Hybrid systems are certainly gaining more steam in the access control environment; however, South Africans still have a deep-rooted fear of putting their access control systems in the cloud.
We are already seeing AI used actively for report data processing, and we have a couple of our own integrations that leverage AI to further enhance the quality of the data we process for them. AI integrations will only grow.
What do end users want?
As systems become more complex, end users want the confidence that their system will work and not be compromised. Users expect their service providers to act with integrity and follow industry standards, so simply following these guidelines will be a key step to retaining the relationship. Users expect that the service provider will ‘know everything’ as they are the professionals, so providing sound professional advice is key to educating about the limitations of the systems they are providing. We see far too often that a service provider sells a solution that is simply beyond the scope of what the end user requests or understands.
Digital identity on the cards?
We love the idea of digital identities; however, we believe that the greater Africa is not quite ready for the transition to this medium, though we see it being accepted in more affluent areas. We already see the ‘normalisation’ of handing over our driver’s licences and ID cards to security guards at gated communities, so I am confident that we will get the normalisation of the digital identity ironed out in the foreseeable future.
As for the challenges in rolling this out, it is all about educating end users about these credentials and their use. Modern smartphones are certainly making the deployment of these credentials easier, as manufacturers are making features like NFC and biometric access standard.
Rivash Raghubir, MD of RR Electronic Security Solutions
Over the next few years, the traditional access control market is poised for significant transformation. It is increasingly recognised that access control systems are no longer limited to the basic function of opening doors; they are evolving into valuable data resources that can provide insights and streamline operations.
Key shifts in access control I expect to see include:
Integration across systems: End users are seeking greater integration capabilities. Modern access control systems must communicate seamlessly with other technologies. For instance, when an employee swipes their access card, it should trigger multiple responses: activating lights, adjusting HVAC settings, and notifying HR of their presence. This kind of integration enhances operational efficiency and improves the overall user experience.
Demand for data: Users are increasingly interested in the data generated by access control systems. They want actionable insights that can inform security strategies and operational decisions. The ability to analyse access patterns can help organisations optimise their resources and improve security protocols.
Cybersecurity concerns: While I may not be a cybersecurity expert, it is clear that many customers are wary of cloud-based systems. Concerns surrounding monthly costs and potential security vulnerabilities are driving this hesitation. As a result, there is a growing preference for on-premise solutions that provide greater control over sensitive data.
In conclusion, the emphasis is shifting towards systems that offer comprehensive integration and valuable data insights, while addressing the critical concerns surrounding cybersecurity. Organisations are looking for solutions that not only enhance security, but also improve overall operational efficiency.
Cloudy or clear?
The current landscape for access control systems resembles a tug-of-war between cloud adoption and traditional solutions. Despite the growing hype around cloud technologies, many local end users continue to prefer on-site dedicated PCs or servers.
Preference for on-premises solutions: A significant number of clients are price-sensitive and prioritise control over their data. This desire for data sovereignty is driving many to opt for on-premises systems, where they feel they have greater security and oversight.
Cloud adoption challenges: Even with the advantages cloud solutions offer, such as scalability and remote access, local users remain hesitant due to concerns about data privacy and ongoing costs
Potential for mobile integration: Introducing mobile options could bridge the gap between traditional systems and cloud solutions, offering users more flexibility, while still allowing them to maintain control over their data.
AI may not have a transformative impact on traditional access control systems in the immediate future, but it certainly holds promise in enhancing various aspects of the industry.
Smart assistants powered by AI can significantly improve operational efficiency within access control systems. By analysing data patterns, AI can enhance reporting capabilities and provide valuable insights that help organisations make informed decisions. This positions companies leveraging AI ahead of their competitors.
The integration of facial recognition technology with CCTV systems can elevate security measures and streamline operations. AI can facilitate real-time analysis of video feeds, enabling quicker responses to potential security threats and improving overall situational awareness.
AI can also assist in optimising operational flow by identifying usage patterns and predicting access needs. For instance, it could automate processes such as scheduling or resource allocation, ensuring that facilities operate smoothly and efficiently.
What do end users want?
At the core of their needs, end users seek reliability and responsiveness from their service providers, whether they are product or integration providers.
Reliable systems: End users want access control systems that function seamlessly without unnecessary complications. They expect technology that is intuitive, efficient, and effective in meeting their security needs. A system that delivers consistent performance is crucial to maintaining trust and satisfaction.
Immediate support: Availability of support is paramount. End users desire service providers who are responsive and can address issues promptly, regardless of the time or day. They appreciate a proactive approach in which providers not only resolve problems swiftly, but also anticipate potential challenges before they escalate.
Transparent communication: Clear and open communication is essential. End users want to be kept informed about system updates, potential issues, and best practices for maximising their systems’ effectiveness. This transparency builds a stronger partnership and fosters trust between users and providers.
Customisation and integration: End users also seek solutions tailored to their unique needs. Integration with existing systems is crucial, as users want a cohesive ecosystem that enhances operational efficiency. Providers who can offer customised solutions and smooth integration processes will stand out in the market.
Digital identity on the cards?
The concept of passwordless access, particularly through standards like FIDO, is certainly gaining attention, but its widespread adoption in Africa is likely to take time.
Emerging technologies: In South Africa, we are beginning to see traction with technologies such as NFC (Near Field Communication) and Bluetooth, particularly in the context of bank cards and loyalty programs. These advancements indicate a willingness to explore more secure and convenient authentication methods.
Challenges to adoption: Despite these developments, several challenges may hinder the rapid adoption of passwordless access and digital identities across the continent. These include infrastructure limitations, cultural and behavioural factors, and regulatory and security concerns.
While it may not happen in the immediate future, the potential for passwordless access and digital identities in Africa is certainly there. As technology continues to evolve and infrastructure improves, we will gradually see a shift towards these modern solutions.

Walter Rautenbach, MD of neaMetrics.
Convergence, integration and cloud have been the industry’s favourite buzzwords for years, with AI the latest addition to that well-worn list. The good news is that over the past year, we have seen real momentum, with these concepts finally moving beyond clichés, with AI acting as a key enabler. What has become clear is that these ideas are inseparable; in many cases, they describe the same outcome from different angles.
Access control is no longer about devices or managing doors. Access and video data are now recognised as rich sources of operational intelligence. We are seeing intelligent video more tightly integrated with access control, deeper alignment with cybersecurity frameworks, and a growing demand for a unified security view across broader business operations.
Expectations have been set. AI has demonstrated what is possible and has moved beyond being a brochure talking point. End users have noticed, and their expectations are rising accordingly. Those who succeed will be the ones who can genuinely merge data and systems to deliver this new standard of intelligent, integrated security.
As far as AI is concerned, it is already having a significant impact on access and identity, but it remains a tool, not a replacement for human decision-making. Its real value lies in accuracy, consistency and scale. By reducing false positives, human error and operational noise, AI improves confidence in security decisions.
AI is improving biometric accuracy and enabling behavioural detection and event correlation across access and video systems. It can also act as an integration layer, making sense of data from multiple systems and presenting it in a more unified, actionable way. This moves integration beyond basic data exchange toward contextual understanding, where events across systems can be correlated and prioritised automatically.
That said, AI only adds value when it is applied with purpose. In security environments, complexity is already high, and AI should reduce operational load rather than introduce yet another layer to manage.
Cloudy or clear?
Cloud adoption locally is no longer a foreign concept, but it is not a default either. What we see most often is a requirement for choice, allowing organisations to balance flexibility and scalability, and to migrate at a pace that matches business readiness. For many end users, the decision is less about technology preference and more about trust, uptime, skills and operational continuity.
End users are comfortable using cloud services where it makes sense, such as centralised management, visibility across sites, remote access and analytics, but they are equally clear about where control needs to remain local. In mission-critical security environments, blindly moving everything off-site is simply not realistic. The result is a pragmatic, phased approach rather than an all-or-nothing decision.
Our role is to give businesses that flexibility by supporting on-premise, cloud and hybrid architectures. The ability to design systems with centralised or edge-based intelligence makes it easier for organisations to decide what runs where, and to evolve their architecture over time.
What do end users want?
End users are no longer looking for product suppliers or installers; they are looking for partners who understand their environment and take responsibility beyond deployment. As access and identity systems become more integrated and central to operations, value shifts from the technology itself to how well it is designed, implemented and supported over time.
What customers want most is honest guidance. They expect service providers to work with what already exists, plan realistic migration paths and avoid forcing rip-and-replace approaches. Integration is rarely clean, and requirements change, so providers need to stay engaged as systems evolve.
Ultimately, trust matters more than specifications. Providers who can simplify complexity, communicate clearly and stand behind their decisions are the ones end users continue to rely on.
Digital identity on the cards?
Africa should not be underestimated. The continent showed leadership in digital and biometric identity as early as the early 1990s, when many other regions had not yet seriously engaged with digital identity. At the same time, Africa has proven to be a pragmatic adopter of global trends, often applying them in ways that fit local realities and scale.
Passwordless access and digital identity are real, but they are not arriving as a single, uniform or overnight shift. Adoption looks different depending on the country, sector, and level of risk involved. In enterprise environments, we are already seeing movement toward passwordless access and stronger digital identity models, largely driven by usability, improved security and the need to reduce credential fatigue.
Where progress tends to slow is not the technology itself, but trust and governance. Digital identity only works at scale when trust is designed into the system — through strong frameworks, secure data exchange and clear governance. These questions do not disappear simply because new standards emerge. For that reason, physical and digital identity are likely to coexist for some time, often combined through hybrid models that blend biometrics, mobile credentials and traditional access methods.
Rather than trying to leap straight into fully digital, passwordless environments, most organisations are better served by building on what already works and allowing identity to evolve as part of a broader, trusted access and security infrastructure. The same principles increasingly apply to access control, where trust, interoperability and resilience must be built into the platform rather than managed through policy alone.

Wouter Du Toit, sales director Africa, Smart Biometrics, IDEMIA.
Access control is rapidly moving from just opening doors to an identity-centric platform. In Africa, mid to enterprise organisations are looking for connected, intelligent systems that deliver real value and meaningful data. They want more than basic entry logs; they want meaningful insight into who is accessing their environments and how that access connects to security operations, facilities management, HR and broader business processes. Identity management is becoming the foundation of modern access control.
Once an identity can be trusted, integration across physical and digital systems becomes simpler, more secure and easier to manage (expect more emphasis on trusted identities). At the same time, awareness around cybersecurity and data protection has grown significantly, and customers now expect these to be built into solutions from the start. As a result, access control is increasingly seen as a key cornerstone for both physical and logical identity management, with a strong emphasis on delivering a frictionless user experience.
AI is already part of everyday access and identity solutions, even if users do not always realise it. It helps improve biometric accuracy, reduces errors, and adds intelligence to how access events are analysed. In our market, AI will increasingly be used to spot unusual behaviour, improve security decisions and automate processes. Over the next few years, AI will quietly become the norm rather than something seen as new or experimental.
Cloudy or clear?
Cloud adoption is growing, especially for visitor and workforce management solutions. South Africa is a bit slower than other regions, as cost and comfort with existing on-premises systems remain factors. Hybrid setups are common, with some systems staying on-site while others gradually move to the cloud.
What do end users want?
End users want guidance and clarity. They want to understand where the market is going and how today’s investments will still make sense tomorrow (longevity/futureproof). From an OEM and integration perspective, they look for proven technology, strong local support, and the ability to integrate with existing systems. Flexibility is also important. Customers want solutions that can grow with them, not force costly replacements. Demonstrated integrations and clear service commitments are essential.
Digital identity on the cards?
Yes, very much so, especially in mid to large-scale organisations. Passwordless access and digital identity are gaining traction because they improve security while making access easier for users. Identity management should be the starting point to build trust, and biometrics plays a key role in that process. Challenges still exist, such as legacy systems and varying levels of digital readiness, but the direction is clear, and adoption is steadily increasing across the region.
| Tel: | +27 11 543 5800 |
| Email: | malckey@technews.co.za |
| www: | www.technews.co.za |
| Articles: | More information and articles about Technews Publishing |
| Tel: | +27 11 543 5800 |
| Email: | malckey@technews.co.za |
| www: | www.securitysa.com |
| Articles: | More information and articles about SMART Security Solutions |
| Tel: | +27 11 794 2825 |
| Email: | info@rress.co.za |
| www: | www.rress.co.za |
| Articles: | More information and articles about RR Electronic Security Solutions |
| Tel: | +27 87 551 3005 |
| Email: | frazer@enkulutech.co.za |
| www: | www.enkulutech.co.za |
| Articles: | More information and articles about Enkulu Technologies |
| Tel: | +27 12 679 2900 |
| Email: | wouter.dutoit@idemia.com |
| www: | www.idemia.com |
| Articles: | More information and articles about IDEMIA |
| Tel: | +27 11 784 3952 |
| Email: | info@neametrics.com |
| www: | www.neametrics.com |
| Articles: | More information and articles about neaMetrics |
© Technews Publishing (Pty) Ltd. | All Rights Reserved.