SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Intercom technology and entry security: Keeping pace with security innovation

Intercom technology and entry security: Keeping pace with security innovation
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Intercoms now include advanced technologies, enhancing security systems beyond traditional expectations.
  • Aiphone offers diverse intercom solutions for education, healthcare, commercial, and residential markets.
  • 2N intercoms provide robust site security with video/audio integration and programming capabilities.
Related Links
  • Aiphone improves the functionality of its GT video intercom system

Some integrators and end users may think of intercoms as older technology that isn’t required as part of a robust security system. Not true. Intercoms include innovative technologies that have developed rapidly, keeping pace with other categories. Just as cameras and access control systems have made technology improvements in leaps and bounds, so has voice audio – and intercoms offer features and benefits no other product can provide.

Aiphone entry security

“When it comes to communications, entry control and emergency assistance, intercoms lead the way,” says Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp. “Intercoms are almost ubiquitous on K-12 campuses. They are common in virtually every other security vertical market. And they are providing communications without interfering with a business’s lifeline – the telephone.”

Aiphone’s technology includes a variety of intercom and entry security products to meet the needs of the education, healthcare, commercial, government and residential markets. Aiphone’s audio and video intercoms include both analogue two-wire connections and TCP/IP (Transmission Control Protocol/Internet Protocol) units to protect exterior entries and to secure vital interior spaces. With nearly 40 standard systems, Aiphone can create a system for virtually any intercom application.

Are emergency intercoms still needed in the age of cell phones? The preponderance of cell phone use, not surprisingly, is contributing to the rapid growth of mobile safety apps that put callers in contact with assistance right from their smartphones. These technological advances have left some wondering if security systems like emergency speakerphones are still necessary; but simply trading out speakerphones for cell phones is ill-advised, says David Fleming, Chief Design Officer for Code Blue Corp.

Code Blue VoIP/analogue speakerphones

Emergency speakerphones
and intercoms act as integrated security stations that provide
a wide array of emergency communication solutions

Emergency speakerphones and intercoms act as integrated security stations that provide a wide array of emergency communication solutions, Fleming says. They serve as the hub for all security devices at a location, from cameras to card readers to lights and speakers. “Removing them could be a potentially dangerous and hasty decision for locations looking for a complete security solution,” says Fleming. 

Code Blue offers both voice over IP (VoIP) and analogue emergency speakerphones that are available with multiple options and configurations to create a customised user experience. When they are combined with Code Blue’s durable steel enclosures and sophisticated systems management software, Code Blue speakerphones can be utilised as a comprehensive end-to-end security system.

Intercoms also suffer from a reputation of providing unintelligible sound. “This myth has prevented security executives from optimising and innovating their people, process and technology around intelligible voice,” says Dan Rothrock, SVP of Global Strategic Alliances, Zenitel North America. “And because of this assumption, there is no evaluation criteria around judging quality intercom systems. Bad audio is not okay. It threatens the viability of the risk mitigation efforts of our security programs.”

“With today’s advancements, you can hear, be heard and be understood in virtually any environment,” says Rothrock. 

The preponderance of cell phone use is contributing to the rapid growth of mobile safety apps that put callers in contact with assistance right from their smartphones
Emergency speakerphones and intercoms serve as the hub for all security devices at a location, from cameras to card readers to lights and speakers

Vingtor-Stentofon solutions

Vingtor-Stentofon by Zenitel Group is a world-leading provider of critical communication solutions on the land and at sea. Building on more than 70 years of innovation, today’s technology uses secure and exceptionally intelligible SIP end-devices to provide solutions in IP intercom, video intercom, emergency communications and public address. (SIP is Session Initiation Protocol, the communications protocol used in Internet telephony.)

Zenitel seeks to provide a path to intelligibility: To hear, to be heard, and to be understood in every situation. Zenitel emphasises critical communications and solutions that can be integrated in an organisation by providing seamless interoperability with access control, video surveillance management, and telephone switching and voice-over-IP systems around the world. Finally, Zenitel’s emphasis on innovation and quality ensures the solutions meet stringent requirements of IT departments by delivering high availability, scalability, reliability and defensibility that are required for mission-critical applications.

2N IP intercom models

2N says its products are much more than “just intercoms.”

“They are a SIP end point, which, while serving as an intercom, can also perform much more in the end users’ system than placing a call,” says Craig Szmania, CEO, 2N USA. “Our ‘intercoms’ are highly programmable, allowing for functionality not normally attributed to a door station.”

2N’s products can add significantly to an end user’s site security system with video and audio inputs and outputs, have the ability to control actions, are integratable into most building systems and yes, of course, provide communication from one point to another or globally. “Our intercoms are definitely much more than the old-fashioned perception of an intercom,” says Szmania.

Zenitel seeks to provide
a path to intelligibility: To hear, to be heard, and to be understood in every situation

2N USA is a manufacturer of seven IP intercom models that share a common software platform based on 2N’s own operating system. The models include basic audio only, highly ruggedised emergency call box models, and top-of-the-line sophisticated commercial models suitable to any Fortune 50 corporate headquarters. Most models can be equipped with HD/IR ONVIF-compliant cameras, high-end audio, and all are “pure SIP.”

2N intercoms are built based on the company’s own hardware designed in-house at 2N’s research and development (R&D) department in Prague, Czech Republic. Roughly a third of all 2N employees are in engineering, highlighting the company’s focus on new product development to provide a technological edge.

2N supplies solutions to schools, governments, commercial enterprises, small- and medium-sized businesses (SMBs), residential, industrial and transportation.

“At 2N we have started to call our intercoms ‘SIP end points’ as they have capabilities far beyond a point-to-point audio communicator and are used in many varying applications; including control of production lines in an industrial setting, access control for office buildings and as a first line of security for schools,” says Szmania.

Read part 3 of our Security Intercoms series here

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Residential security systems
  • Industrial security
  • Healthcare security
  • Security cameras
  • Security access systems
  • School security
  • Door security
  • Door access control
  • IP security solutions
  • Related links
  • Aiphone Audio, video or keypad entry
  • Aiphone Access control systems & kits
  • Aiphone Access control readers
  • Audio Only Audio, video or keypad entry
  • Keypad & Audio Audio, video or keypad entry
  • Video & Audio Audio, video or keypad entry
  • Video, Keypad & Audio Audio, video or keypad entry
  • Articles by Larry Anderson
  • Related categories
  • Access control systems & kits
  • Audio, video or keypad entry
  • Access control readers
  • CCTV monitors
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Expert commentary
About this page

Innovative intercom technology enhances entry security, keeping pace with evolving requirements for access control solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec