Zenitel is pleased to present IC-EDGETM at Intersec Dubai 19-21 January and welcome everyone to discover the future of intelligent communication, at stand SA-I33. Zenitel’s team looks forward to meeting with the visitors at Intersec Dubai and introducing them to IC-EDGE, the company’s next-generation platform and family of intelligent communication devices, delivering out-of-the-box unrivaled sound quality, interoperability, security and ease of use.

IP-based intercom system

IC-EDGE is a smart IP-based intercom system that uses edge processing and device-based server technology to enable secure, reliable and crystal-clear audio communication in even the most demanding environments – all enabled by intelligent communication devices and scalability to meet the user’s immediate and future communication needs.

Fitting into the broader Intersec themes of commercial security, information security, smart home, perimeter and physical security, IC-EDGE and the Zenitel family of innovative access control, video surveillance, PA/intercom and IPBX and VoIP systems, Zenitel will be on hand to discuss and demo their state-of-the-art critical communications solutions.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...