Category: Research

  • Conference Whisper: Identiverse 2025

    Conference Whisper: Identiverse 2025

    Published to clients: June 10, 2025                                       ID: TBW2083

    Published to readers: June 11, 2025                      

    Published to Email Whispers: August 18, 2025

    Publicly Published with video edition: August 18, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): D. Doreen Galli

    Abstract:

    Identiverse 2025 welcomed 3,300+ attendees to Mandalay Bay – nearly a 20% gain over 2024. Featuring 250+ sessions and 150 exhibits all on one floor, the event was smooth and accessible. Keynotes and sessions emphasized teamwork, resilience, and collaboration, while exploring AI in identity, decentralized credentials, and zero-trust implementation. Exhibitors showcased innovations from selfie-based authentication to intelligent access control and secrets vault cleanup. The shift from Aria to Mandalay Bay marked a new chapter for the expanding event, which returns to Mandalay Bay in 2026.

    The Conference

    • Identiverse 2025 was held at Mandalay Bay Convention Center, a move from Aria in 2024. It hosted 3300 attendees, 250 sessions and 150 exhibitors.

    Cautions

    • Friendly reminder: this research provides examples of what was shared with us at the event, not an evaluation, validation, or recommendation of the given technology.

    TAGS

    Identiverse 2025, digital identity, identity security, zero trust, AI in cybersecurity, decentralized identity, verifiable credentials, identity governance, privileged access management, IAM, IGA, cybersecurity conference, Mandalay Bay, authentication, biometrics, secrets management, SSO, MFA, ITDR, access control, enterprise security, digital trust, identity trends, identity innovation, conference highlights, tech expo, identity tech, identity solutions, cybersecurity trends, identity keynote, identity management

    Conference Vibe

    After over 53 videos, almost 200 minutes of content only 2 escalator rides, 30,000 steps and over 25 fact checks, our coverage of 2025 Identiverse ends. The event spanned 4 days, had over 250 speakers, 150 exhibits and with over 3300 attendees – 700 more registered over last year. Registration went very smooth with rarely any waiting time. Interestingly, we were informed many registered late. Executives realize that reducing risks and therefore related losses is a viable path to protecting profits in uncertain times. This year’s event took place at Mandalay Bay Convention Center, a change from Aria last year. Most enjoyed the conference taking place all on the same floor. It was great to see the conference grow and expand. Like all changes, there were the old timers yearning for the days when they all packed into too small rooms at Aria. Unfortunately, some of the sessions located physically further from Expo Hall reported some in person attendance challenges from those too tired to walk to the room. The event featured a full collection of meals. We were able to capture the Tuesday Seminar’s Lunch and the lunch on Wednesday in Expo Hall.

    While at Identiverse, we conducted research for three additional forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.

    1. Whisper Report: How can organizations implement zero-trust security without disrupting user experience?
    2. Whisper Report: What are the latest advancements in decentralized identity and verifiable credentials?
    3. Whisper Report: How can AI and behavioral analytics enhance identity security?

    Readers and viewers wishing to experience the entire event are encouraged to view the Conference Whispers: Identiverse Playlist in its entirety. Once the video edition is available, the playlist will be sited as a pinned comment on the video edition. It is also easy to locate any previous Conference Whispers playlists through TBW Advisors Website under Subscribers research/Conference Whispers.

    Keynotes and Sessions

    Identiverse is absolutely one of those events where regardless of the amazing session you choose, you are aware you are also missing an incredible session – or two. Fear of missing out was rampant. Fortunately, we were able to capture 53 videos for our clients and subscribers. The first Keynote featured John Pritchard, CEO of Radiant Logic. Titled, “Identity isn’t a solo Game” it drove home the message that one cannot succeed in identity without collaboration with the professionals around you throughout the organization and with others in the industry.

    Another frequently referred to keynote featured the UK’s Hanna Rutter who is realizing their government digital identity solution. In her talk she spoke about the challenges of such a decentralized digital identity solution and how she is overcoming roadblocks on her path to success. A much in demand topic regarding identity challenges in the realm of AI was presented by Richard Bird. A tech talk held in the expo hall was hosted by Microsoft. Their tech talk covered the hot topic of ITDR, Identity threat detection and response.

    Exhibits

    Identity is a topic found not only in the expo halls of Identiverse, but was also seen in the halls of HIMSS, Fintech Meetup, Money 20/20 and ISC West just to name a few. What is interesting is the different manners of vendors describe their technology. At ISC West, vendors in the expo hall spoke in terms of a solution. They would always emphasize the PII information is not on the badge, rather a hash of the biometric data which enables verification is provided instead. While this was not clarified on the videos at Identiverse, the vendors later disclosed the same technical approach that was taken on the technology captured at Identiverse. If you are seeking a tap-in to sign-in on a shared device for your organization, Imprivata was in the expo hall with their solution. If you would like to verify the customer requesting the high-risk transaction is the same customer who signed up for the account, Panani shared their technology. Keyless offers a solution to authenticate high risk actions with a selfie. If you are an engineer developing a solution and need the capability to onboard customers, no need to start at square one! PropelAuth provides an out of the box identity capability you can add on to your solution to onboard customers! Seeking to manage your remote teams and seeking a cost effective out of the box solution to provide SSO and MFA? Cubeless shared their free and easy SSO and MFA solution made for you. 

    Is managing privileges gotten to be too much for you and your organization? Apono Unified Access Management is an intelligent solution that aims to provide just enough just in time privilege for human and non-human-identities (NHI). Oasis goes one step further in managing AI Agents’ Identity, provisioning, deprovisioning and cleaning up stale accounts. Are your coders overwhelmed trying to identity what secrets vault to use so they land up hardcoding the secret? Is your organization suffering from identity vault sprawl? GitGuardian was on hand with their solution that can assist you in identifying and remediating secrets vault sprawl.

    Expo hall also featured quite a few IGA (identity governance and administration) and PAM (privileged access management) platforms. Omada captured their 25-years’ IGA experience into a free best practice framework. This framework includes use cases and related configuration recommendations for their platform, Omada Identity Cloud. Lumos shared their agentic AI autonomous IGA solution. This solution can even recommend what privileges a new employee should get based on their role and department. If you have a small but complex environment, Clarity Security has an IGA solution targeted at your organization.

    Keeper Security shared their zero-knowledge identity solution for endpoints. Their solution is referred to as zero knowledge as the customer’s data is encrypted on the endpoint with the customers key; meaning, Keeper Security has no access to customer data whatsoever. Bridgesoft shared their complete identity platform that also can adapt and include any components that may already exist in your environment. Specializing at the start of the process, CyberSolve helps organizations commence new identity programs. Looking for IAM services across the portfolio? Simeio was on site there to offer guidance. Clients are reminded to schedule an inquiry to review the current state of your identity program. If you are seeking to expand it or modernize it, we will produce an inquiry plan to guide you along the journey even if you are working with an outsource provider or consultant.

    Next Year’s Conference  

    Identiverse will once again be held at Mandalay Bay Convention Center June 15-18, 2026.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    TBW Advisors LLC Logo

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 

    Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 

    Published to clients: May 20, 2025                                               ID: 2073

    Published to Readers: May 21, 2025

    Email Whispers: June 13, 2025  

    Video Edition: June 13, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    As cyber and physical security continue to merge, proactive, multi-layered strategies are essential to safeguard critical assets in interconnected environments. Secure data practices, including encryption for data in transit and at rest, during compute, and ensure compliance with high security standards. Architectural resilience is crucial, integrating cybersecurity from the outset rather than retrofitting outdated systems. Correlating physical and cyber events provides valuable context. Finaly, digitizing workflows streamlines response efficiency, minimizing the window of vulnerability during attacks.

    Target Audience Titles:

    • Chief Technology Officer, Chief Security Officer
    • Chief Information and Security Officer, VP of Cybersecurity
    • Director Cyber Physical Security, Security Analyst
    • Cybersecurity Engineer, Incident Response Analyst

    Key Takeaways

    • Data must be encrypted at rest, in transit, and during execution.
    • Cyber Physical security requires a securely designed architecture from the start.
    • Cyber and physical threats must be correlated.
    • Only a digitized workflow can respond with the required speed to cyber physical threats.

    Secure data

    As with all security, cyber physical security must also be concerned with, “ data security and encryption … that’s data in the device, data in transit, data in rest at the servers, and so all of those things we have the highest level standards and we also meet more advanced requirements, “ Bioconnect’s Edsel Shreve. The solution should be flexible enough to enable any data protection requirements that come into play. Edsel Shreve went on to further explain, “for example you need to do certificate rotation for things like TLS encryption So we can do those things not every customer wants them but those are the things that we’ve actually got in our system for the folks that have those higher level requirements so it really is the combination of how do we make sure that they’re cyber secure sitting on the network and then how do we make sure that they’re  physically and the data is secure on the on the readers and devices themselves.” In addition, TBW Advisors LLC recommends confidential computing architectures for protection and privacy during computations. For additional information see Industry Whispers: Public is Private – Confidential Computing in the Cloud.

    Secure Architecture

    Taking a 1968 mustang and updating it to 2025 safety standards would be quite the challenge and likely land up with an ugly beast that is neither safe nor resembling of a mustang. Cyber physical security is no different than safety. It must be thought of and integrated from the very beginning. As LVT’s Steve Lindsey explained, “it starts with architecture if we can rethink our architectures and we can start building for cyber security in mind.” The challenge of physical cyber security is that, “for the longest time in the physical security space we’ve been using on premise systems and as we’ve lifted and shifted those into the cloud ..  what complicates that is as we’re deploying these systems it’ not just cloud to end User, it’s Cloud to IoT (Internet of Things) device which is going through usually public cellular or satellite infrastructure itself and there’s other things that need to be done to address that” Steve Lindsey.


    Correlate Physical Cyber Events

    The real power of cyber physical security is the two areas working together to correlate events. Through correlation, context and a greater understanding is realized. An example shared by Advancis’ Paul Shanks demonstrates this best. “Someone loses their badge and falls out of their pocket and they’re logged into the network from home and their badge is used at the building. Those two  events by themselves are benign but we take that together and create a an alert for the operator to look into whether is it a Cyber attack or is it a physical attack.”

    Digitize Workflow

    As early as 2019 TBW Advisors LLC has been advising clients to automate security responses when possible for the simple fact you must. Ransomware attacks were already taking place within a 35-minute window. In 2025 the cyber physical attack vector also calls for automation or a digitized workflow at the very least. As Advancis’ Paul Shanks communicated, “we can take that and make that workflow digitized so that all they have to do is read click and go. Simple as that.”

    Related playlists

    1. Industry Whispers: Public is Private – Confidential Computing in the Cloud | TBW ADVISO RS
    2. Conference Whispers: Black Hat USA 2019
    3. Whisper Report: How can we enhance our cybersecurity measures to protect against emerging Cyber Physical threats? 
    4. Conference Whispers: ISC West 2025
    TBW Advisors LLC logo

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: How can we ensure compliance with evolving regulations?

    Whisper Report: How can we ensure compliance with evolving regulations?

    Published to clients: May 6, 2025                                                                            ID: 2066

    Published to Readers: May 7, 2025  

    Published to Email Whispers: May 19, 2025

    Public with video edition: May 20, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    To navigate evolving fintech regulations, experts at Fintech Meetup 2025 emphasized three key strategies: staying engaged with the field and regulatory agencies, structuring well architected stable solutions, and leveraging AI or Copilots. Together these proactive approaches help fintech firms stay ahead of regulatory shifts while maintaining security and efficiency.

    Target Audience Titles:

    • Chief Technology Officer, Chief Security Officer, Chief Information and Security Officer, Chief Trust Officer, Chief Compliance Officer, Chief Risk Officer
    • Head of Product, VP of Product, Chief Marking Officer, Data Protection Officer, Director of Data Protection
    • Enterprise Architect, Director of Data Governance, Chief Privacy Officer, Head of IT Audit

    Key Takeaways

    • Today’s security breaches are the source of tomorrow’s regulations.
    • Security cannot be an afterthought; it must be planned from the beginning.
    • Leverage AI and Copilots that are integrated with your processes to aid employees.

    How can we ensure compliance with evolving regulations?

    We took the most frequently asked and most urgent technology questions straight to the Fintech experts gathering at Fintech Meetup 2025. This Whisper Report addresses the question regarding how can we ensure compliance with evolving regulations? As Socure’s Matt Thompson shared, “I don’t think it’s enough in this space to be a passive Observer or responsive or reactionary to regulations, there’s a lot of Evolution right now happening.” Figure 1 shares three actions you can take to conquer evolving regulations.

    Stay Engaged

    One of the best actions an organization can take to stay on top of regulations is to stay engaged and in touch with the real world. First, real world happenings such as hacks define future regulations. As SecurityMetrics Matt Cowart shared, “QSA (Qualified Security Assessor) is really going to help you understand where you’re sitting at and as they are informed with the evolutions of technology and all the advances that are going on having them connected with  real world teams.” Or as Matt Thompson of Socure suggested, “staying engaged with the regulators and the development of the regulations themselves.” If you know what the regulators are working on in draft, you will not be surprised when it becomes law. Keep in mind the reach of the company determines what exact regulators and what specific regulations apply. As OnFido’s Marie Millick shared, “we have a team of subject matter experts that are constantly researching. We also collaborate with the same team that works with interpole around everything around data privacy and identity.”

    Structure Solutions for Stability

    Many suggest the best way to be prepared for evolving scenarios of all types is to start with a robust and secure foundation. As Onbe’s Tony McGee shared, “our company is fully audited, fully solutioned and architected to protect the data.” This architecture doesn’t act alone but is complimented with strong processes. Tony McGee further explained, “ensuring that we build in the processes to make sure that every step of the way is a compliant one.” Together architecture and processes form a robust foundation. This robust foundation enables Onbe to ensure, “that the consumer understands all the fundamentals of the payout.”

    Any clients at this phase should schedule an inquiry to receive guidance. We will set up a plan of inquiries during your journey to give you any guidance we may have or can gather to assist you. The plan should capture milestones including but not limited to strategy reviews, presentation reviews, and even architecture reviews.

    Leverage AI and Copilots

    Today, we are no longer left with antiquated tools. As Thetaray’s Adam Stuart pointed out, “the traditional rule-based systems you have to know what you’re looking for to build that rule but if you don’t know what you’re looking for and you’re looking for these new patterns and behaviors that people are using you can’t do that with the simple rule base which is why cognitive AI is such an important feature to include.” In other words, in addition to keeping up to date and starting with a solid foundation, the tool itself contributes to identification of potentially troubling patterns. Interface.ai’s Connor Tullilus draws us a picture of what this is like in the real world. “To be able in real time have a co-pilot AI assistant sitting behind the scenes to assist them in the day-to-day operations. One in real time being able to update your policies procedures while (two) being able to (use) the AI assistant hooking up with your current knowledge bases your share.”

    *When vendors’ names or quotes are shared as examples in this document, it is to provide a concrete example of what was on display at the conference or what we heard doing our research, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document.

    Related playlists

    1. Conference Whispers: Fintech Meetup 2025
    2. Conference Whispers: Money 20/20 2024
    3. Conference Whispers: Identiverse 2024
    4. Q1: Fintech Meetup Playlist – How can we ensure Compliance with evolving regulations?

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Whisper Report: What are the biggest challenges of using generative AI in logistics?

    Whisper Report: What are the biggest challenges of using generative AI in logistics?

    Published to clients: April 28, 2025                                                            ID: 2058

    Published to Readers: April 29, 2025

    Published to Email Whispers: May 8, 2025

    Public: May 9, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    The logistics and supply chain sector faces significant challenges with data. Issues include non-existent data, inconsistent formats, manual errors, and lack of historical context. These problems stem from complex processes and resistance to change. Human-machine interaction adds another layer of complexity. Generic AI models struggle due to the unique demands of logistics. Despite these hurdles, there are opportunities for generative AI to enhance efficiency and provide valuable insights. Successful implementation requires accurate, context-rich data and a willingness to transform processes. Embracing AI can lead to improved operations and better decision-making in the logistics industry.

    Target Audience Titles:

    • Chief Supply Chain, Logistics Officer, Procurement, Technology, and Data Officers
    • Supply Chain, Logistics, Procurement, Technology, BI

    and Data Science Directors

    • ERP Specialist, Supply Chain IT, Data Scientists, BI and related managers

    Key Takeaways

    • Inconsistent, incomplete, and manually entered data hinder AI’s effectiveness.
    • Poorly structured processes and a reluctance to adopt AI-driven solutions slow innovation.
    • Onboarding new suppliers and standardizing systems remains difficult.
    • Generic AI models don’t understand logistics-specific challenges.
    Strategy rating 3
Tech depth 1

    Biggest challenge using Generative AI in Logistics??

    We took the most frequently asked and most urgent questions straight to the logistics and supply chain experts in the industry. This Whisper Report addresses the question regarding the biggest challenges using generative AI in supply chain and logistics. The first challenge, however, is not unique to that industry nor is it unique to generative AI. This challenge applies to a all analysis and analytics including all forms of AI – generative or not regardless the size of the models. Put simply, no matter how many ways you state it, when you put garbage data in you will get garbage results.

    Tom Larson with ITS Logistics “bad inputs in = bad outputs.”

    Balaji Gunter with Hoptek, “case of garbage in garbage out.”

    Blake Donaldson with Nutrabolt, “quality of information.”

    Obrie Scarborough with Wolley Digital Innovations, “good in good out.”

    Jacob Hobbs with Cubiscan, “you are only as good as your data.”

    Additional research on technology available to help with getting and cleaning data in supply chain and logistics is available in Conference Whispers: Manifest 2025 and Conference Whispers: Smart Retail Tech Expo.

    Challenges Unique to Logistics and Supply chain?

    Given the dominance of a common answer, this raises the question, is the sector of logistics and supply chain in worse shape versus other industries? More specifically, is the data itself within logistics and supply chain the problem and if so, why? Put simply and as depicted in Figure 1, the challenges go far beyond the data. As Don Addington of Cloud 9 Perception put it, “in logistics space there is a level of complexity that is more complex than others.” These complexities come in for the following reasons.

    Figure 1. Challenges using Generative AI in logistics

    Data doesn’t exist

    There is an ideal digital world which is very different from the physical world. As Owen Nicholson from Slamcore pointed out, “If you are not seeing real world deployments with all the gnarly things that go wrong you are only creating idealized models that don’t work in the real world.” Distribution centers are full of human and robot workers as well as machines from multiple manufacturers. Unlike construction, many of these machines are in the same building they entered at the start of their usefulness as brand new machines long before generative AI term existed. Logistics is not the neat and tidy world of fintech transactions.

    Data is inconsistent

    As Ben Tracy of Vizion pointed out, “(many) skipped a few fundament steps, being useful and being reliable…  They don’t monitor data quality, they don’t have consistency amongst data formats, and their systems are not exportable for the data that is inside of them.” Or what data professionals call it- ‘good old fashioned data quality’. To put it in the simplest terms possible, we all learned early in elementary school you need data in the same units to perform any math over the data. You do not add inches and feet together. You cannot add meters and feet together. You don’t speak globally about time without time zones. But perhaps most important, you cannot create data quality nor can you analyze data you haven’t or cannot export.

    Data is manual and miss-keyed

    If you are wondering how bad that data can be, Dawn Favier of Green Screens provided some hard facts, “its not uncommon to flag 35% of their (customers) data as dirty. Dirty meaning miss-keyed data, something tagged as full truck load when its partial.” Obviously, if one looked at data for a half truck and leveraged for a full truck, the resulting analytics are useless. With 35% of one’s data being dirty, there is work involved before you can even hope for insights.

    Data lacks historical context
    For any AI to be successful, you need massive amounts of data over a very small problem so the mathematics behind the AI can provide useful information. As Atit Shah of Chetu explained, “

    Even if you have the right collection of data, you can generate incorrect forecasting. A lot of people do not have a huge history or the history of the records so they go into the gen AI because everyone is doing it but it doesn’t meet their expectation.“ No matter how powerful the technology, all forms of AI need good data. Furthermore, the data must have context to be useful for any advance form of AI including generative AI.

    Bad Processes
    One obvious reason for messy data is the messy, manual, and imprecise or undefined processes it represents. The biggest challenge as Bill Driegert of Flexport shared, is simply, “not slapping it (generative AI) on bad processes. There needs to be a lot of process engineering required to leverage AI.”  If process re-engineering and establishing a clean data fabric is your organizations Mt. Everest, TBW Advisors LLC offers a lot of first-hand experience and expertise to teams and executive via inquiry. Any clients at this phase should schedule an inquiry to receive guidance. We will set up a plan of inquiries during your journey to give you any guidance we may have or can gather to assist you. The plan will cover milestones including but not limited to strategy reviews, presentation reviews, and architecture reviews. It is not an area to go through without a guide on your side even if the work is outsourced.

    Resistant to change

    It is always important to consider the culture of any organization when executing or desire to execute change management. As Erica Frank of Optimal Dynamics put it, “need to take a healthy assessment, how resistant are we to change, how are we going to challenge this from the top down.”  As with any change management, executive buy-in with a business objective are critical to success. AI for the sake of AI is always a bad idea.

    Perhaps the reason many in this space are resistant to change is the change is constant. As Jason Augustine of WNS put it, “Environment keeps changing every 3-6 months”. Thus discovering opportunities to align and integrate the transformational changes into these already occurring network constant changes is a less tumultuous approach.

    Human Machine Interaction

    Logistics, like manufacturing and construction, has a lot of machines in the loop. Those machines may or may not be intelligent machines. Thus as Dr. Mario Bjelonic of Rivr.ai shared, “the challenge will come up in terms of how the humans and robots will act as a team together.” Optimizing the total solution over this shared space is the true goal. But as one organization is optimized, what about working between each organization?

    As Justin Liu from Alibaba.com stated, “biggest challenge what it can do and what it cannot do

    is the on boarding suppliers cannot be done by AI”. That’s correct. Bringing each and every machine into the system, or each and every supplier and the complex of array of data that that suppliers managed to coalesce together IS ITSELF NOT standardized thus cannot be automated.

    Can’t use Generic Gen AI

    As Balaji Guntur of Hoptek pointed out, “Most of the models are very generalized.” “AI is data hungry, and you need to train it on real data. The biggest challenge Generative AI in logistics is that the generative models don’t know what logistics is doing. This is the main challenge,” Aviv Castro, Sensos. In summary, as best put by Nykaj Nair of Sugere, “you need data highly accurate data that is relative to the companies supply chain.”

    Opportunities for Generative AI in Logistics

    With all the challenges discussed, it may seem discouraging. It is important to realize the significant opportunity awaits thus easily providing business justification for the work to transform – carefully. As Justin Liu of Alibaba.com put it, “we are continuously adopting AI into our workflow into our latest and greatest features and functionalities to do their business more efficiently.” Rye Akervik of Shipsi believes the value is, “in adding it as a first layer to understand the (customer) issue.” Mick Oliver of Dexory shared, “We don’t see it as a challenge we see it as an opportunity and provide insights based on that data.” Rich Krul of Hoplite observed that the intelligent systems are, “way more efficient, people get their answers a little faster and thinks that is a good thing for the industry.” Most importantly as Georgy Melkonyan of Arnata pointed out, “Shouldn’t fear it (AI) is going to take your job, ai will not replace your job. The people that use ai are going to replace your job.”

    *When vendors’ names or quotes are shared as examples in this document, it is to provide a concrete example of what was on display at the conference or what we heard doing our research, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document.

    Related Research and Playlist

    1. Whisper Report: How can we manage tariff costs in our supply chain?
    2. Whisper Report: What are the biggest challenges of using generative AI in logistics?
    3. Conference Whispers: Smart Retail Logistics Expo
    4. Conference Whispers: Manifest 2025

    Corporate Headquarters

    2884 Grand Helios Way

    Henderson, NV 89052

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Industry Whispers: Earth Day Technology Panel

    Industry Whispers: Earth Day Technology Panel

    Moderator: Dr. Doreen Galli, TBW Advisors

    Doreen Galli

    Chief of ResearchTBW Advisors LLC

    Dr. Doreen Galli is the Chief of Research at TBW Advisors LLC. She’s led significant and measurable changes as an executive at IBM, DPWN, Dell, ATT, and most recently Microsoft. Dr Galli was Chief Technology and Chief Privacy Officer in Azure’s MCIGET. Gartner recognized Dr. Galli as an expert in data ingestion, quality, governance, integration, management, and all forms and analytics including sensor data.

    Join us on Earth Day for an insightful panel featuring the CEOs of Enerdrape, Storj.io, DigitalBedrock.com, and GraphEnergyTech.com. This event will explore cutting-edge innovations in renewable energy, data storage, and digital preservation. Enerdrape will showcase their pioneering geothermal panels, while Storj.io will discuss decentralized cloud storage solutions. DigitalBedrock.com will highlight advancements in digital preservation, and GraphEnergyTech.com will present their latest in sustainable energy technologies. This panel is tailored for CIOs and CTOs and other technical executives seeking to drive sustainability and innovation within their technical organizations. Don’t miss this opportunity to gain valuable insights and network with industry leaders.

    Research Code TBW2072

    Margaux Peltier is an engineer and science entrepreneur with a MSc. in Civil Engineering from EPFL Lausanne. During her master thesis, she developed a strong interest in renewable geo-energy systems, recognizing the untapped potential of shallow geothermal energy and the need for innovation in this domain. She co-founded Enerdrape, where she serves as CEO, defining and overseeing the startup’s vision and strategy. Before founding Enerdrape, she worked as an engineer on several R&D projects related to BIPV-T and solar-power houses in Canada, and as an HVAC engineer in Geneva. Margaux also worked on various international projects as an engineering consultant in energy geostructures.

    Colby is the Chief Executive Officer at Storj, a seasoned cloud tech executive leading growth initiatives to usher in a new era of cloud computing. Before Storj, he co-founded and served as CEO of CrowdStorage, the world’s largest distributed cloud storage platform, acquired by Storj. He scaled CrowdStorage to serve over 1,000 customers, including Western Digital and Vivint, and managed strategic partnerships for Vivint Smart Home, the leading smart home services provider in North America. Colby is a member of the Fast Company Impact Council and Forbes Technology Leadership Council.

    Linda Tadic is the Founder/CEO of Digital Bedrock, a managed digital preservation service. With over 35 years of experience, she has held positions at HBO, the Media Archives and Peabody Awards Collection at the University of Georgia, ARTstor, and Pacific Film Archive. Linda consults and lectures on digital asset management, audiovisual and digital preservation, metadata, and the environmental impact of digital preservation. She received the 2021 SMPTE James A. Lindner Archival Technology Medal for her leadership, research, and work in digital asset management, audiovisual and digital preservation, copyright, metadata, and environmental impact. Linda has taught as an Adjunct Professor at UCLA’s Department of Information Studies and NYU’s Moving Image Archiving and Preservation program.

    Thomas Baumeler is the CEO and founder of GraphEnergyTech, a startup pioneering highly conductive carbon-based (graphene) electrodes for renewable energy applications. He holds a PhD in chemistry from EPFL, where he conducted groundbreaking research on perovskite solar cells under Prof. Michael Graetzel at the Laboratory of Photonics and Interfaces, earning the 2023 EPFL Doctorate Award. Driven by a passion for sustainability, Thomas founded GraphEnergyTech to develop cost-effective, high-performance alternatives to metal electrodes, with applications in solar energy, energy storage, and printed electronics.

    Subscribe to see more research summaries and conference videos.

    Become a client

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking , The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Conference Whispers: Customer Connect Expo 2025

    Conference Whispers: Customer Connect Expo 2025

    Las Vegas, NV April 16-April 17

    Published to clients: April 22, 2025                ID: TBW2078        

    Published to readers: April 23, 2025

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:    

    After over 200 minutes of recording, 6 flights of stairs, and over 30 factchecks, our coverage of the rebranded Customer Connect Expo 2025 or CCE25 closes. The event featured over 43 keynotes and seminars and over 200 vendors exhibiting. Keynotes included discussions on customer loyalty, employee satisfaction, data-driven personalization, and AI in customer experience. A seminar focused on enhancing call centers with AI agenst is also included. Exhibits ranged from technology supporting customer experience and call centers, data consolidation and customer 360, to entire platforms and BPO services.

    The Conference

    • The event featured over 43 keynotes and seminars and over 200 vendors exhibiting.
    • Technologies covered include telephony, networking, SIP, call blocking, data, data management, data fabrics, customer 360, AI, LLMs, agentic AI, conversational AI, and bots.

    Cautions

    • Just because a solution ‘works’ doesn’t mean the product was designed with customer privacy in mind.
    • Platforms that combine multiple functions can look like a quick win unless you already have installed components or desire to switch a specific function to a best in class. Ensure any ‘platforms’ leverage standards for any components. By adhering to standards, customers can avoid vendor lock into the platform and keep the door open for maximum architectural flexibility.

    Conference Vibe

    After over 200 minutes of filming, 6 flights of stairs, over 30 fact checks, our coverage of the rebranded event, Customer Connect Expo 2025, or CCE25, comes to a close. CCE25 opened with a grand ribbon cutting ceremony featuring the Global Voice of Customer Experience, Dennis Wakabayashi. TBW Advisors LLC’s clients and subscribers may recognize Dennis from last year’s AMA Industry Whispers event with Dennis. Admittedly, this event is one we always look forward to having covered it in 2023 and 2024 under its previous branding of CCCLV for Call & Contact Center Expo Las Vegas. The event features 4 stages hosting a total of 43 keynotes and seminars. The theaters for the speakers were mixed amongst over 200 exhibitors in expo hall. The keynotes and seminars were full coming in just under maximum capacity. The last two years, there were notable audio issues for the speakers. This year they had a dual audio set up with headphones and speakers. I only heard one major feedback sound the entire event. In fact, the sound worked so well that it kept the audience enthralled preventing them from walking around as much as in previous years. This led exhibitors to politely describe foot traffic as a “slow”. While the total booth traffic was light, the exhibitors did admit that the leads they obtained were rock solid with most easily covering the expenses. In other words, everyone was there was serious about conducting business with not much fluff. Food was also available within the expo hall itself.

    While at CCE25, we conducted research for three additional forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.

    1. Whisper Report: How can we integrate AI-driven customer service solutions with our existing IT infrastructure?
    2. Whisper Report: What are the most effective strategies for ensuring data security and privacy in customer interactions?
    3. Whisper Report: How can we leverage customer interaction data to drive business insights and innovation?

    Readers and viewers wishing to experience the entire event are encouraged to view the Conference Whispers: CCE25 playlist in its entirety. Once the video edition is available, the playlist will be sited as a pinned comment on the video edition. It is also easy to locate any previous Conference Whispers playlists through TBW Advisors Website under Subscribers research/Conference Whispers.

    Sessions

    During our coverage at CCE25 we were able to catch 4 keynotes and one seminar. The first keynote we captured was by Pfizer’s Wayne Simmons. Wayne reminded all that customers want companies that are interested in partnering for life when possible. In many domains such as banking, it is very inconvenient and takes significant effort to switch companies. One a customer is lost – it is expensive to reacquire that customer if at all possible.

    Ford’s Dr. Kalifa Oliver drove home the obvious but too often overlooked point. If an employee is miserable and being treated horrible, how do you think they will treat your customers? A company should not be worried about an employee being happy but rather ensuring they have the tools and support to do the job. The development of employee satisfaction tools tend to be behind customer satisfaction tools but they need not be separate tools. It’s simple, data shows a satisfied and empowered employee is more likely to provide a positive customer experience.

    The second day keynotes kicked off with Macy’s Siva Kannan Ganesan on the power of data. Siva highlighted the importance of capturing customer data including every click. A customer experience must be engineered. The two-tower approach was recommended for one’s digital strategy the achieve the ultimate in personalization.

    Ring Central’s John Finch was on the Keynote stage to talk about Agentic AI driving the next generation of customer experience. The presentation went beyond revealing the next generation of customer experience tools. Context for the value contributed by conversational AI, generative AI, bots as well as the power of agents and personalized assistants was also provided. Expanding on that agentic AI theme was a seminar on expanding your call center with AI agents. Mitrol’s Francisco Trojano shared their approach to improve contact center’s impact. This seminar included various success stories.

    Solution components

    The exhibits had a large variety of vendors including various components of solutions to create the ultimate customer experience. To the surprise of some, fax usage has risen 23%. Faxsipit shared their solution that won’t create a chain of mis transmissions and errors even for 1400-page documents! Perhaps, like many of the exhibitors, you are meeting and speaking with your prospects at a conference and don’t want to miss any of the potential leads. Claritiv shared their solution to capture and enable your ability to analyze these interactions. Need a method to see what the customer is experiencing first hand? With Blitz you can send a quick link that allows them to share their camera view without downloading a mobile application. Perhaps you interact between the physical and digital world and want a vendor that can help you? Put Unified Direct Solution on your radar who specialize in optimizing such a scenario including balancing needs based upon conditions. If you are short of staff and are thinking about outsourcing but not sure you want your customers to deal with outsourced agents, you might want to evaluate Kongusto. Now that you have all this staff, you’ll want them to feel like a team even if they are spread around the world. To that end, Nexgen virtual office shared their next generation of leveraging technology to create the ultimate in virtual office. Regardless of your technology, if you were seeking to market your solution, Greenstar Marketing was there with their services.

    Data Centric, Platforms, and BPOs

    There were exhibitors with products focused on bringing your data together and providing insights. Maprehend focused on the expertise of your very best employee and empowering all. Likewise, if you wanted to clone your best sales agent, Verse.ai focuses on the best message on the right channel to deliver results. Enthu.ai connects and consumes all your customer interactions with a side of automation to provide useful customer insights. Diabolocom leverages a proprietary AI solution that is trained exclusively on your data for your private model. Zaon’s approach is to start with the problem or use case and connects the subject matter experts to create solutions.

    If you are seeking a contact soluton provider beyond the data and perhaps a solution that is actually a carrier, Nobelbiz is a telephony carrier and can assist if your calls are not getting connected correctly. Assembled is a support operations platform with three pillars. One pillar handles AI agents through all forms of contacts, second is vendor management offering including handling billing, and third workforce management to increase productivity. A platform for omni channel communications highly integrated with AI agents is available through Mitrol as described earlier in their seminar. If you are looking for a platform with a side of business process outsourcing (BPO), Etech harnesses the power of AI to drive your customer experience through calls, chats and all customer interactions. The three focus areas include contact center services, Quality and analytics and customer development. ValueLabs leverages its own generative AI platform built leveraging various LLMs. ValueLabs focuses on four areas: outsourced product development, quality engineering, data engineer and process automation. ProntoBPO offers shared services, rental stations, BPO as well as software development. ProntoBPO specializes in verticals such as Pest, Lawn and HVAC services.

    Next Year’s Conference

     CCE conference will unfortunately move to Atlanta, GA for 2026.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.

  • Industry Whispers: Public is Private – Confidential Computing in the Cloud

    Industry Whispers: Public is Private – Confidential Computing in the Cloud

    Join us for “Public is Private – Confidential Computing in the Cloud,” featuring Mike Bursell from the Confidential Computing Consortium and Manu Fontaine, founder of Hushmesh. This event will delve into the transformative potential of confidential computing for cloud environments. Aimed at CIOs, CTOs, enterprise architects, solution architects, and technical product managers, the discussion will cover how confidential computing enhances data security and privacy, even during processing. Learn about real-world applications, challenges, and future trends in this critical technology. Don’t miss this opportunity to gain insights from industry leaders and explore how to leverage confidential computing for your organization’s success.

    Research Code TBW2071

    Moderator: Dr. Doreen Galli, TBW Advisors

    Doreen Galli

    Chief of ResearchTBW Advisors LLC

    Dr. Doreen Galli is the Chief of Research at TBW Advisors LLC. She’s led significant and measurable changes as an executive at IBM, DPWN, Dell, ATT, and most recently Microsoft. Dr Galli was Chief Technology and Chief Privacy Officer in Azure’s MCIGET. Gartner recognized Dr. Galli as an expert in data ingestion, quality, governance, integration, management, and all forms and analytics including sensor data.

    Mike Bursell

    Executive DirectorConfidential Computing Consortium

    Mike Bursell is the Executive Director of the Confidential Computing Consortium, having been involved since its foundation in 2019, and Co- chair of the OpenSSF’s Global Cyber Policy working group. He is one of the co-founders of the open source Enarx project and was CEO and co- founder of the start-up Profian. He has previously served on the Governing Boards of the CCC and the Bytecode Alliance and currently holds advisory board roles with various start-ups. Previous companies include Red Hat, Intel and Citrix, with roles in security, virtualisation and networking. He regularly speaks at industry events in Europe, North America and APAC and has a YouTube channel dedicated to cybersecurity education. Professional interests include: Confidential Computing, Cyber Policy, the EU Cybersecurity Resilience Act (CRA), Linux, trust, open source software and community, security, decentralised and distributed systems, Web3, blockchain. Mike has an MA from the University of Cambridge and an MBA from the Open University, and is author of “Trust in Computer Systems and the Cloud”, published by Wiley. He holds over 100 patents and previously served on the Red Hat patent review committee.

    Speaker Profile

    Manu Fontaine

    CEOHushmesh Inc

    Manu Fontaine is the Founder and CEO of Hushmesh, a dual-use Public Benefit cybersecurity startup in the Washington DC area. The company believes that people need safe code and authentic data, just like they need clean water and stable electricity. To deliver this, Hushmesh leverages Confidential Computing to develop and operate “the Mesh”: a global information space, like the Web, but with universal zero trust and global information security built in. Secured by the Universal Name System (UNS) and the Universal Certificate Authority (UCA), the Mesh provides global assurance of provenance, integrity, authenticity, reputation, confidentiality, and privacy for all information within it, at internet scale. Hushmesh is a NATO DIANA Innovator startup.

    Dr. Roy Fune

    Cannot make it live? Register and submit your question. The answer will be in the video on TBW Advisors’ YouTube Channel.

    NO AI note takers allowed. Event copyrighted by TBW Advisors LLC.

  • Conference Whispers: ISC West 2025

    Conference Whispers: ISC West 2025

    Las Vegas, NV March 31-April 4

    Published to clients: April 7, 2025         ID: TBW2069  

    Published to readers: April 8, 2025           

    Published to Email Whispers: July 28, 2025 12pm.

    Publicly Published with video edition: July 28. 2025 2pm.   

    Analyst(s): Dr. Doreen Galli

    Photojournalist(s): Dr. Doreen Galli

    Abstract:

    After capturing almost 50 videos, over 150 minutes of content and countless shorts forthcoming, our coverage of ISC West 2025 closes. Attendees gathered for ISC West 2025 held in Las Vegas March 31-April 4. The event featured innovations in video surveillance, driver-assisted systems, palm vein identity solutions, edge AI, and gunshot detection. Exhibits included AI vision, camera intelligence, and layered security solutions. TBW Advisors was able to capture exclusive content from the live sessions as well as full details on top products at exclusive Press Briefings.

    Cautions

    • ISC West offers the option to print your badge at home. It is important to note that you not only need your badge holder and lanyard on site, but you still must wait in the registration line. Specifically, you must present and verify your ID to get a sticker on your badge for it to be useful. IF you only snag the badge holder, you will land up back at the long registration lines.

    Conference Vibe

    Our coverage of ISC West 2025 includes over 38 videos and over 150 minutes of video content spanning session summaries, product overviews, and answers to three urgent questions. There will be countless shorts forthcoming so save the entire Conference Whispers: ISC West 2025 playlists by clicking on the book mark symbol. Registration was quite interesting for the x attendees as one could print the badge at home but still required face to face registration to get the validation sticker. Held at Venetian, the customary Venetian Café Presse was open as well as the Venetian Food Marketplaces within expo hall if you got hungry. The event seemed to exceptionally crowded as you can feel as all waited for expo* hall to open and was loud enough to trigger a 100db warning on my watch. Upon clearing security, endless exhibits featuring massive amounts of vision AI,  AI video analysis, IoT sensor data, and complex security identity solutions bridging the physical and cyber worlds.

    While at ISC West, we conducted research for three forthcoming Whisper Reports for our clients. The playlists are unlisted but available and will eventually fill in with the video version of the report so you may wish to bookmark these playlists.

    1. Whisper Report: How can we enhance our cybersecurity measures to protect against emerging threats?  
    2. Whisper Report: What are the best practices for integrating AI and machine learning into our security systems?
    3. Whisper Report: How can we ensure compliance with new and evolving security regulations?

    Sessions and Press Event

    We are excited to share that we have two exclusive pieces of content where the presenters gave a special overview just for TBW Advisors LLC, our clients, and subscribers. First, we have the session by Intel RealSense. This session focused on the combination the long history in vision and the long history of AI together to successfully create the current generation of facial recognition for the purpose of useful Identity and Access Management via the biometric field of one’s face. Keep in mind, data representing one’s face is PII or personally identifiable information. While not healthcare, the protection of PII requires the same care as all PII data as discussed during our coverage of Conference Whispers: HIMSS 25.

    The second session summary we were also treated to includes a look at when cyber and physical security combine. Operations and IT coordinating to achieve a business function is quite common. As anyone who has been a corporate CIO in an organization with physical buildings knows, security is security. Physical security must interface with IT systems to understand who is permitted to do what. Historically, if physical security fails, IT systems are always at a higher risk due to information being left around or the increased attack surfaces made available via the ability to physically access a network terminal or a server itself depending on the organization. In 2025, the rush to get data from everything connected to survive the pandemic or to rush ahead with AI solutions has increased possible attack surfaces. The confluence of these scenarios together has made the Cyber Physical Security practice space blossom so expect to hear and see a lot more in this space for the foreseeable future.

    Whenever given the chance, we try to bring unique content and details about the companies at the conferences to you. At ISC West we were able to attend a special, press only event held by Taiwan Excellence better known as Taitra. Taitra’s mission is to help spread the word around the world about innovations coming out of Taiwan by featuring some of their companies. The editor in Chief for Security Today Magazine, Ralph Jensen also spoke at this event to kick it off. We were able to capture the full 10-minute presentations for each of the 6 technologies featured!

    The first technology featured is Cyberlink. Cyberlink provides extensive video surveillance capabilities including the ability to successfully track people. In the event of a violent attack or a lost child, finding the desired human being from all the surveillance video available can be quite timely without the right technology. Cyberlink’s people tracking works even if the face is not visible on the video through posture, clothing, or body movement signature.

    Advanced driver-assisted systems (ADAS) are popular in automobiles but for larger vehicles it is still newer due to the complexity and size of semi-trucks. EverFocus gave the press an in-depth overview of their current solution including the company’s success in obtaining many Taiwan and global certifications enabling deployment.

    The third technology presented at the event was Himax with their palm vein identity solution. As this contactless solution works even if a surgeon has scrubbed for surgery and put on their two pairs of surgical gloves, this technology could have easily been featured at HIMSS25 or Identiverse. Himax is not only known for their palm vein identity solution but also for their ultralow power AI processor that runs their solution and is available on the market as WiseEye.

    The fourth and fifth companies presenting both featured edge solutions. Kneron featured a general-purpose secure full stack edge AI solution that support AI services at the edge for a large variety of use cases. One example is combing standard RGB video with thermal camera information for a cohesive image to properly identity living beings or animals in the camera’s view. Likewise, Vivotek specializes in IP Surveillance solutions including network cameras, network video recorders (NVRs) and related software solutions and accessories.

    Exhibits

    The product mix set at ISC West is interesting as it spans AI vision, Camera Intelligence, surveillance, and identity. Let’s start with the best in show new product two-time award winner, Vaidio. Vaidio provides an AI vision platform leveraging their deep AI expertise. Their belief is you should be able to point a camera at anything and make it safer. Safr is a vision AI solution focuses on facial recognition and liveness verification for live video including watchlist alarms. We also had an extensive booth tour by Intel RealSense. As you can see, their solution is quite easy to integrate for developers. Enrolment is quite simple. Their chip/software solution is integrated into many of the products on the floor. They also provided a live demonstration of their solution in action. If you are famous or a high NetWorth  individual and you are not comfortable with your personal identity or other information floating around the web, 360 Privacy was there with their solution.

    Advancis is 30-year-old company that provides a one-stop identity solution that focuses on integrating as many hardware devises as possible. It currently can integrate with over 550 hardware devices on which it can capture and verify credentials. They add support for approximately 30 devices each year. Also playing in the Physical Identity and Access Management (PIAM) space is RightCrowd. RightCrowd specializes in complex scenarios for organizations with many employees, many visitors across many locations. For those seeking a PIAM solution leveraging facial recognition or fingerprints, Bioconnect might be on your radar. Bioconnect integrates with the top 8 IAM platforms in the market. For a layered security approach, dormakaba provided TBW Advisors LLC with an exclusive booth tour walking through their offering and various layers. If any of the biometric or other identity information needs to be put on a secure card with any of the contact and contactless embedded technology, Dascom was on site. Their printer can securely hold up to 200 finished product cards until a batch is completed and retrieved.

    Diving more into the physical security aspects, LVT provides a mobile security unit that is rapidly deployable. LVT’s low power solution leverages cellular connectivity and high scalability for future proofing its deployment. Underneath the surface, LVT leverage the latest in agentic AI capabilities within its solution to provide these advanced capabilities. Another agentic AI solution that

    stops threats without human intervention based on video surveillance, Spot.ai might be on your radar. As an Agentic AI solution, Spot.ai not only detects an issue but can automatically handle the threat in 90% of the cases. Specifically, the solution will automatically be able to execute things like intimidating announcements, spotlights on, and following the potential threat as well as turn on sirens. The solution notifies a humans if the automation determents fail.

    Finally, if safety and security means identification of a gun shot and its source, Databuoy was on hand. With technology funded by DARPA, their solution is just as effective in your closest metropolitan area as it is in a urban combat.

    Next Year’s Conference  

    ISC West 2026 conference will once again be held at the Venetian in Las Vegas, Nevada. The dates are yet to be announced for 2026.

    *When vendors’ names are shared as examples in this document, it is to provide a concrete example of what was on display at the conference, not an evaluation or recommendation. Evaluation and recommendation of these vendors are beyond the scope of this specific research document. Other examples products in the same category may have also been on display.

    ©2019-2025 TBW Advisors LLC. All rights reserved. TBW, Technical Business Whispers, Fact-based research and Advisory, Conference Whispers, Industry Whispers, Email Whispers, The Answer is always in the Whispers, Whisper Reports, Whisper Studies, Whisper Ranking, The Answer is always in the Whispers, and One Change a Month, are trademarks or registered trademarks of TBW Advisors LLC. This publication may not be reproduced or distributed in any form without TBW’s prior written permission. It consists of the opinions of TBW’s research organization which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, TBW disclaims all warranties as to the accuracy, completeness or adequacy of such information. TBW does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by the TBW Usage Policy. TBW research is produced independently by its research organization without influence or input from a third party. For further information, see Fact-based research publications on our website for more details.