The event led the leading systems integrators in East Africa, gained an in-depth understanding of the advantages and rich feature set of AxxonSoft products

The event showed participants how AxxonSoft software work "in action" for next-generation video surveillance

A three-day training event was held from 10 to 12 September in Nairobi, the Kenyan capital, by organiser SNB. An AxxonSoft partner, SNB showed participants how AxxonSoft software – both the Axxon Intellect Enterprise PSIM platform and innovative Axxon Next video management software – work "in action" for next-generation video surveillance. Local systems integrators, who made up the audience for the event, expressed enthusiastic interest in the opportunities offered by AxxonSoft software. Representatives of 15 security-industry companies attended the event in all.

The main achievement of the training event was that the participants, leading systems integrators in East Africa, gained an in-depth understanding of the advantages and rich feature set of AxxonSoft products, having seen proof of their functionality, innovativeness, and reliability.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...