Security Technology Live will take place at the NEC, Birmingham, from 13-15 May 2014
Security Technology Live will take place at the NEC, Birmingham in 2014

A poll produced by the organisers of Security Technology Live is currently showing that 85% of attendees to IFSEC recently (Monday 13 May) agree that the NEC, Birmingham is the best venue for a security exhibition.

The poll, which will run until the end of the week, asked for attendees to agree or disagree with the statement that the NEC, Birmingham, is the best venue for a security event.

With 16000 car parking spaces and located at the heart of the UK Motorway network the NEC is a proven destination to attract the security channel. Security Technology Live, 13-15 May 2014, will take place at the NEC, Birmingham and will be a dedicated security channel event for manufacturers and distributors to meet and do business with new and existing customers.

Interested parties are invited to meet the Security Technology Live team and view their presentation inside their hospitality suite next to Wetherspoons inside the NEC Piazza.

Security Technology Live will take place at the NEC, Birmingham, from 13-15 May 2014.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...