Nedap launches AEOS 3.1.4, introducing intercom integration with Commend intercom. As a result of this integration AEOS not only instantly shows who is at the door, but at the same time verifies this person via the intercom. Controlled access can subsequently be given.

‘Giving controlled access is one of the tasks most frequently performed by receptionists and security guards’, says Arjan Bouter, Sales Manager at Nedap. ‘In the Graphical Alarm Handler of AEOS they already had direct control of sensors, doors and cameras and now an intercom has been added to that. With this intercom integration of one of the major suppliers of Critical Communication Systems, the user has full control when providing access. Moreover, for control afterwards, this solution simply provides complete insight into which operator gave access via which intercom, including the accompanying video recordings. Post-event control has never been this easy’.

AEOS is an integrated solution for security management that combines access control, video management, locker management and intercom into one platform. By integrating intercom into AEOS, Nedap and Commend offer a comprehensive and compact solution for companies and organisations.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...