Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

UK telco EE adopts Nedap AEOS access platform

UK telco EE adopts Nedap AEOS access platform
Everything Everywhere, the UK’s most advanced digital communications company, plan to expand throughout the UK and they are confident that by choosing AEOS, they have a future-proof security system that can grow and expand as they do.

Everything Everywhere, the UK's most advanced digital communications company, plan to expand throughout the UK and they are confident that by choosing AEOS, they have a future-proof security system that can grow and expand as they do.

After a lengthy selection process, EE selected Nedap because of the modern, versatile design of their access control platform – AEOS. Unique within the marketplace, AEOS is a powerful software-driven platform that couples functionality and powerful hardware, tailored for individual configurations. AEOS can be adjusted and expanded to meet future expectations.

Security and scalability can be found in many systems but the versatility to connect and configure more than just access control on a single controller impressed the EE team that have an eye for value and future usability. EE can access system their new system anywhere due to the 100% web-based interface and have saved from not installing client software at any site.

The installation of the project is to be carried out by Nedap's partner Reliance High Tech and the 3-way partnership of manufacturer, integrator and customer will combine to map out the future security for Everything Everywhere.

Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to:
Most Viewed Articles