Tech Trends: MQTT Creates a Path to True Open Architecture

A communications technology born in the oil and gas industry may be the key to simplifying the security integration process.
Feb. 13, 2026
5 min read

Key Highlights

  • MQTT — a lightweight IoT messaging protocol originally developed by IBM — has quietly been making its way into the security industry over the past few years, and it matters because it offers a fundamentally different path to open architecture than the costly, fragile SDK and API integrations the industry has relied on for decades.
  • Unlike traditional integrations that require deliberate engineering and licensing fees, MQTT's publish-and-subscribe model lets systems freely communicate small data packets back and forth through a broker — no formal integration required — which is exactly why access control, smart building, and video platforms are beginning to adopt it as an interoperability pathway.
  • The tradeoff is real: MQTT's lightweight, scalable design also creates cybersecurity vulnerabilities, which remains the primary barrier to broader adoption — meaning integrators and consultants evaluating MQTT-enabled platforms need to scrutinize how vendors are addressing those risks before assuming "open" means secure.

 

This article originally appeared in the February 2026 issue of Security Business magazine. Don’t forget to mention Security Business magazine on LinkedIn or our other social handles if you share it.

Having written for this publication since 2020, it has become common knowledge at this point – but to be clear, I find history to be interesting, and I find emerging technologies to be fascinating. MQTT has both qualities – it is a technology that has been around for a long time, yet it is just now emerging in the security industry.

What is it?

MQTT is a messaging protocol Standard for the Internet of Things (IoT). Initially named Message Queuing Telemetry Transport by IBM in support of their MQ series product line, the name has been removed, with the acronym, MQTT, becoming the proper name. It can be described as a lightweight publish and subscribe messaging transport ideal for connecting remote devices with a small code footprint and minimal network bandwidth.

MQTT was first used for machine-to-machine communication between two clients with a cloud-hosted broker in the middle. Companies are now adopting MQTT for communication because it features several significant advantages: 

  • It is lightweight, so devices with batteries can communicate with minimal resources.
  • It uses bi-directional communication, so messaging can be achieved between the endpoint device (publisher client) and cloud broker; and the cloud broker and recipient device (client device), and vice versa.
  • With the minimal data being sent, MQTT can scale to connect millions of devices.
  • It is ideal for unreliable networks by supporting multiple persistent sessions, which reduces the time to connect between clients and brokers.
  • It employs TLS, OAuth, and SSL authentication protocols for security.

MQTT has made its way into the security industry over the last three or four years, and finally, security manufacturers and software developers are beginning to look at MQTT as a pathway to interoperability.

All that said, it is important to note that many of MQTT’s advantages can also create vulnerabilities. Being lightweight with bi-directional communication and the ability to scale to millions of devices with minimal security means MQTT creates cyber vulnerabilities, which is one of the top reasons it is not adopted.

While traditional machine-to-machine (M2M) communication features an endpoint that requests data from a server, and the server sends the data to the endpoint, MQTT works on a publish and subscribe model by separating the message sender (the publisher) from the message receiver (the subscriber). In the middle is a message broker, moving the messages between all of the publishers and subscribers. Think of the message broker as the kid in the middle of the class that was told to pass the notes from one student to another and back – publisher to broker to subscriber, and back.

Here is where it gets interesting: Unlike traditional systems, where the network is paramount, with MQTT, it is not. The broker combines networks that are unaware of each other's network (space), inconsistent network connectivity (time), or network collisions due to too much network traffic at either the publisher or subscriber (synchronization).

Like the kid in class, MQTT just waits until the recipient is listening to pass the note.

Why it Matters: Open Architecture

“Open Architecture” is a term thrown around by many manufacturers and software developers in the security industry, and to be frank, many legacy security companies seem very fearful of this term.

To legacy players, open architecture means losing market share. From the integrator, consultant, and end-customer standpoint, “open” typically increases their willingness to adopt that company's technology. Companies have built platforms; now it is time for platforms to be more open.

How did we get here? Why weren’t technologies “open” to begin with?

If you’ve ever wondered why systems break every time an update comes out, it is because for years, the security industry has relied on software development kits (SDKs) or Application Programming Interfaces (APIs) to communicate and integrate. These methods require deliberate action, engineering costs, and typically, a hefty fee for the convenience of communicating with the other company's software. If you want an integration certified, meaning that the primary software will support the integration, there may be an additional fee.

Here's the thing: Most of the data being requested or used between security systems is contained in small packets relaying messages back and forth – for example, system B monitors system A for a change so that system B can do something about it. In this sense, there is no need for integration if the two systems could freely communicate back and forth.  

This is the exact reason MQTT was invented.

MQTT does not remove the need for SDKs, APIs, or certified integrations; however, it does give a way for companies looking to communicate “openly” across technologies for security and smart buildings.

MQTT has made its way into the security industry over the last three or four years, and finally, security manufacturers and software developers are beginning to look at MQTT as a pathway for interoperability.

So far, software developers in access control, IoT, telemetry, fleet management, smart cities, along with ONVIF Profile T (streaming video), and BACNet (Building Automation and Control and HVAC), are leading the way to MQTT adoption.   

In the end, MQTT is poised to open a pathway for technologies and software to be able to communicate – not simply integrate – with a vast number of systems with minimal breakage. This will enable integrators and consultants, and ultimately end-users, to find a viable path to “open.”

About the Author

Jon Polly

Jon Polly

Jon Polly is the Chief Solutions Officer for ProTecht Solutions Partners (www.protechtsolutionspartners.com), , a security technology consulting firm that works with smart cities and corporations to bring business intelligence and public safety through security IoT applications. He has worked as a Project Manager and System Designer for City-Wide surveillance and Transportation camera projects in Raleigh and Charlotte, N.C.; Charleston, S.C.; and Washington, D.C. He is certified in Critical Chain Project Management (IC3PM) by the International Supply Chain Education Alliance (ISCEA). • (704) 759-6837

Sign up for our eNewsletters
Get the latest news and updates