Connected Access Control Systems - Enable Innovation (Video)
Three practical ways to harden cybersecurity in connected access control, starting at the controller.
Three practical ways to harden cybersecurity in connected access control, starting at the controller.
Walk through five real-world use cases that demonstrate how intelligent controllers make cutting-edge capabilities possible — and are taking physical access control to the next level.
With our new Migration Readiness Self-Assessment, Are You Ready to Modernize Your Access Control System? Answer a few questions to find out how prepared your physical access control systems are for modernization — and how to plan your next steps.
Explore security-first access control strategies and find out how to strengthen your organization’s security posture in our White Paper, Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.
Mercury’s hyper-connected controllers are redefining what’s possible in access control. Watch our new video, Access and Beyond, to learn more.
Plan your migration strategy and determine whether you need an overhaul or an update.
In the field of physical security, the increased computing power of local devices — particularly access controllers — paves the way for new capabilities. For example, Mercury MP Intelligent Controllers feature a secure, containerized framework for running Mercury- and partner-developed applications directly on the device. The app environment dramatically increases flexibility by allowing new functionality to be deployed throughout the life of the device. It also supports greater interoperability and allows organizations to customize controller functionality to specific needs without replacing hardware.
This article explores the technical underpinnings of the Mercury Embedded Application Environment, including architecture, security management and data processing workflows.
A Three-Tiered Architecture Supports Security, Extensibility and Performance
The open architecture of Mercury MP Controllers consists of three interdependent layers: hardware, platform OS and application environment. This layered structure allows for secure operation, controlled extensibility and consistent performance.
1. Hardware Layer
At the foundation is a secure processor with hardware-enforced protections, including ARM TrustZone. TrustZone enables execution isolation, separating secure operations — such as cryptographic routines and credential handling — from general-purpose application logic. Combined with memory isolation, cryptographic accelerators and secure key storage, this architecture ensures that sensitive operations are rooted in tamper-resistant components and shielded from memory corruption, privilege escalation and other runtime threats.
2. Platform Operating System
MercOS firmware provides a real-time execution environment based on a hardened Linux kernel. This operating system governs process scheduling, memory management, system logging and network interfaces. It supports secure boot and digital signature validation, verifying firmware and application images at startup. Only signed and trusted binaries can be executed.
Secure boot is enforced from the first instruction the controller runs. Each layer of software is validated against cryptographic signatures, ensuring that unauthorized or modified code cannot run even if a component is physically compromised.
3. Embedded Application Environment
Above the OS is the containerized Mercury Embedded Application Environment. This layer allows applications to run in isolated user spaces with scoped access to APIs and system resources. Apps do not run as root processes and cannot interact with each other or the OS beyond defined boundaries.
The architecture uses digital signatures and manifest-driven permissions to restrict each application’s behavior. Before deployment, all apps are cryptographically signed and must be validated by the controller. During execution, the platform enforces strict separation between application logic, OS services and hardware interfaces.
Security Controls
Security in the embedded application environment begins at the foundation and governs every operational layer. As physical access systems take on greater roles in safety, compliance and operational continuity, their criticality continues to grow.
At the same time, these systems are becoming more digital — integrating with IT infrastructure, supporting cloud services and enabling mobile access. This convergence demands a cybersecurity posture that can handle both physical security requirements and the risks introduced by increased connectivity.
The Mercury Embedded Application Environment architecture enforces trust through structural controls applied from hardware to application logic. Each component and interaction is scoped, verified and constrained to maintain system integrity. This security model applies verified code execution, strict boundary enforcement and controlled data flow to align with enterprise IT requirements.
Data Movement and Execution Control
Applications do not interact with hardware or the network stack directly. Instead, all communication flows through well-defined platform APIs. These APIs provide access to real-time access event data, reader and door control, sensor inputs, logging, telemetry and external system communication.
By centralizing these interfaces, the controller architecture enforces consistency and reduces the risk of low-level system manipulation. This design also makes it easier to upgrade underlying system services without requiring app rewrites, enhancing long-term compatibility and support.
An access event such as the presentation of a badge or the activation of a sensor results in the controller OS dispatching the event through the API layer. Applications subscribed to that event class can process the input, apply logic and invoke responses, such as unlocking a cabinet, sending a log entry or alerting a security team.
Each application has a manifest that defines its resource access and event subscriptions. If an app attempts to exceed its allowed permissions, the platform blocks the action and logs the violation.
Scalability and Maintainability
The modular architecture supports large-scale deployments with centralized oversight. Updates can be staged, signed, distributed and applied without physical access or system downtime. This simplifies lifecycle management, supports policy enforcement at scale and reduces operational overhead.
App versioning and rollback support give administrators confidence in deployment planning. Updates can be verified and tested before wide rollout, and issues can be remediated quickly with minimal disruption.
Enabling Adaptive Access Control
This architecture supports applications that extend beyond credential management. With secure execution, structured interfaces and containerized logic, the embedded application environment enables access control systems to function as decision engines — supporting identity assurance, compliance enforcement, IoT coordination and operational intelligence from a single resilient platform.
For facility leaders and technical decision-makers, this represents a long-term architectural strategy. By embedding intelligence at the edge and designing for modular software growth, the platform avoids the constraints of static infrastructure. It supports policy agility, integration flexibility and lifecycle resilience — all while maintaining the security posture required in today’s converged environments.
Mercury MP Controllers provide a foundation for future-ready access systems that scale with business needs, adapt to regulatory shifts and stay protected against emerging threats. In a landscape where the line between physical and digital security continues to fade, this architecture is built to lead. Ready to modernize your access control strategy? Discover how Mercury’s embedded architecture can help you scale securely and adapt with confidence. [Add link when available]
The convergence of edge computing and access control is changing how physical security systems operate. Mercury MP Intelligent Controllers run a unique embedded application environment that redefines the role of access control devices from transactional endpoints to intelligent, extensible platforms. This shift allows security systems to act faster, scale smarter and adapt to future needs by embedding logic and integrations directly where decisions are made.
Moving Intelligence to the Edge
Legacy access control architectures relied on centralized logic hosted on upstream servers. These designs created latency, introduced single points of failure and limited system adaptability. Mercury MP Controllers break from that model by supporting an embedded application environment that runs custom and certified third-party software directly on the controller. This means decisions are made at the edge, close to the point of access, where real-time performance and fault tolerance matter most.
What the Embedded App Environment Enables
At the core of this architecture is a secure, containerized execution layer that allows multiple apps to run independently on the controller. Each app is signed, verified and restricted to its defined permissions. This structure preserves core system integrity while giving developers the ability to extend functionality.
Apps can interact with connected devices like readers, sensors and locks, as well as upstream enterprise systems. They are deployed without altering base firmware, allowing systems to evolve through modular updates rather than hardware swaps or full software rewrites.
Real-World Application Scenarios
Several certified applications available at launch illustrate how the embedded app environment delivers tangible value across key use cases.
Securing Server Cabinets in Data Centers
The ASSA ABLOY HES KS210 app enables direct integration with up to 32 OSDP server cabinet locks. This app simplifies deployment in data centers that need cabinet-level access control, audit trails and compliance visibility. Running natively on the controller, it eliminates the need for custom integration or middleware, reducing both complexity and cost.
Enforcing PKI-Based Authentication for Federal Facilities
The HID pivCLASS application adds PIV and CAC credential validation at the door, supporting environments governed by FICAM and other federal access standards. This app handles cryptographic verification directly at the controller, removing dependencies on external servers and aligning with high-security, low-latency access requirements.
Device Health and Lifecycle Management at Scale
Mercury partners provide applications that monitor system status, report vulnerabilities and take automated action to maintain device integrity. These apps enable password rotation, firmware updates and certificate management, all from within the controller environment. Organizations with large-scale deployments gain centralized oversight and automated remediation without sacrificing decentralization or edge autonomy.
Each of these applications demonstrates how the embedded app environment extends access control beyond credential verification to deliver operational, compliance and security outcomes.
Technical Architecture and Security
The app environment is engineered to enforce strict security controls throughout the controller runtime. Applications run in secure, containerized partitions, isolated from both each other and the base firmware. This prevents unauthorized interactions and protects system stability even if one app fails or is compromised.
All apps must be digitally signed and validated before deployment. Execution permissions are defined via an app manifest, restricting system resource access to only what is explicitly allowed. The controller OS enforces these boundaries and supports secure firmware boot and update mechanisms to ensure only verified code runs at startup.
Communication between apps, the OS and external systems is governed by a standardized API framework. This provides consistent integration while preventing unauthorized data access or system manipulation. Because the platform supports structured versioning and validation workflows, updates can be managed with confidence, even across large controller fleets.
This security architecture ensures that flexibility does not come at the cost of control. The result is a development and deployment model that is scalable, secure and well-aligned with modern enterprise IT practices.
A Foundation for Innovation
The embedded application environment also unlocks new opportunities for innovation. OEMs and integration partners can develop solutions that address specific vertical requirements, whether for health care, education, finance or transportation, without waiting for firmware updates or relying on closed vendor ecosystems.
By supporting open development and structured app certification, the platform encourages ecosystem growth while maintaining system integrity. This allows access control to keep pace with changing operational needs, regulatory frameworks and threat landscapes.
Software-Defined Access at the Edge
With Mercury MP Controllers and their embedded app environment, access control becomes software-defined, capable of real-time processing, modular integration and secure operation at the edge. This architecture supports new use cases, streamlines complex deployments and enables adaptive response across distributed environments.
As the access control industry evolves, platforms that combine embedded intelligence with secure extensibility will define the next generation of physical security infrastructure. The future of smarter, faster, more secure access begins at the edge.
Learn how edge computing on Mercury MP Controllers can help your organization become more secure and streamline operations. Talk to an expert today.

This eBook, Priorities Driving Modern Access Control Infrastructure: Data-Backed Insights from Global Insiders, distills key findings from the 2025 Trend Report into a clear, accessible guide to where the industry is heading and what’s driving infrastructure decisions today.
The Future of Access Control: What Comes Next?
The next evolution of access control is unfolding as organizations adopt cloud, edge computing and IoT-driven security strategies. According to the 2025 Trends in Access Controllers Report, 72% of security professionals consider controllers a critical part of their system design and 44% are adopting edge computing. These trends signal a shift toward more adaptable, data-driven security systems that can operate reliably across complex environments.
Expanding Intelligence at the Edge
Controllers are handling more security logic on-site rather than relying on centralized systems. Edge computing allows access decisions, credential verification and security responses to happen locally, which improves reliability and reduces delays. This shift is particularly valuable for organizations managing high-volume facilities, remote locations, or sites where network outages would otherwise disrupt operations.
The Trends in Access Controllers Report highlights that 53% of organizations integrate building occupancy data into their security systems. When controllers process this data at the edge, they can adjust access permissions in real time based on occupancy levels or compliance requirements without waiting for a cloud-based update. This capability strengthens both security and operational efficiency.
The Convergence of Access Control and IoT
Security systems are increasingly connected to broader building management infrastructure. The survey found that 37% of organizations prioritize IoT integration when selecting controllers, ensuring access systems work with lighting, HVAC and other automation technologies. Controllers capable of processing real-time data from multiple systems can contribute to energy efficiency, compliance monitoring and space optimization.
For example, access controllers that detect unauthorized attempts to enter a facility can trigger automated camera recordings, lock down specific areas, or alert building personnel without requiring manual intervention. These automated workflows improve response times and create a more cohesive security strategy.
Hybrid Cloud and Scalable Infrastructure
While cloud-based access control is gaining traction — 52% of organizations now use cloud-enabled controllers — most systems will continue operating in a hybrid model. Controllers will balance local processing with cloud-based analytics, long-term data storage and remote management. This approach ensures that systems remain responsive while allowing security teams to centralize monitoring and streamline updates across multiple locations.
Scalability remains a priority. Modular controllers allow organizations to expand security coverage without replacing existing infrastructure. The Trends in Access Controllers Report shows that 86% of respondents prioritize backward and forward compatibility, ensuring that new technology integrates with legacy systems. This flexibility helps organizations modernize security without excessive cost or operational disruption.
Cybersecurity and Embedded Applications
Security teams recognize the increasing risks associated with connected access control systems. The report found that 90% of organizations actively track evolving cybersecurity standards, yet 21% say their current controllers lack critical protections. To address these risks, the latest controllers incorporate hardware-based security measures such as encrypted communication, secure boot and ARM TrustZone architecture to protect against unauthorized access.
Controllers that support embedded applications offer an additional layer of security and customization. Instead of relying solely on external servers, these controllers can run security applications locally to monitor system integrity, manage credentials, or enforce compliance policies in real time. This capability allows organizations to tailor security protocols to specific operational needs while maintaining a controlled, verifiable software environment.
What Comes Next?
The access control industry is shifting toward systems that process data closer to where security events occur, integrate with enterprise-wide infrastructure and scale across distributed locations. The ability to manage security logic at the edge, connect with IoT devices and maintain hybrid cloud functionality will shape future deployments.
Organizations evaluating new controllers should consider their ability to support these trends. Mercury MP Intelligent Controllers are designed for this next phase of access control, combining edge processing, advanced cybersecurity and a flexible architecture that supports evolving security and operational needs.
Read the full 2025 Trends in Access Controllers Report to explore how organizations are preparing for the next generation of security technology.