Contact company icon Add as a preferred source Download PDF version

ADI-GARDINER's new Exeter branchMove gives customers better access to products and spacious trade counter.

ADI-GARDINER (UK) has opened a new branch at Exeter's Mamhead Business Units to serve its growing customer base in the area.  The opening forms part of ADI-GARDINER's national plans focused on targeting key growth areas. 

ADI-GARDINER has one of the largest branch networks in the UK's specialist security industry and, as a result of its successful growth year-on-year, the Exeter branch has become the latest to relocate to larger premises due to increased customer demand in the area.

The new site, almost twice the size of the previous branch, features a spacious trade counter with enhanced display areas to enable customers to easily locate products, larger warehouse storage areas and capacity for additional stock lines.

"To provide the best possible service to the UK security distribution industry, we are constantly reviewing our operational practices," said Mike Reddington, Managing Director of ADI-GARDINER (UK), "and the opening of the new Exeter branch will enable us to continue to deliver unsurpassed service to our rapidly expanding client base."

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...