SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Healthcare security
  • Home
  • About
  • News
  • Expert commentary
  • Case studies
  • Products
  • White papers
  • Videos

Check out our special report on Artificial Intelligence

Read now!

Conscia Sweden qualifies for the Cisco IoT Advantage Partner program to build secure solutions

2 Nov 2020

Conscia Sweden qualifies for the Cisco IoT Advantage Partner program to build secure solutions
Contact company
Contact Conscia
icon Add as a preferred source Download PDF version

Conscia Sweden, a provider of security and IT infrastructure solutions, has qualified as the first Cisco IoT Advantage Partner in the world. This is the result of a lot of completed Cisco IoT training and a wealth of practical experience regarding IoT and industrial networks.

Conscia has also developed the Conscia DevicePortal software, which is used by both private and public sectors in several countries to quickly connect and manage IoT devices in a secure manner.

Building secure solutions

“Conscia has a large customer base in, among other things, the manufacturing industry, and the fact that we are now the world’s first Cisco IoT Advantage Partner is a clear signal that our customers have a first-class partner at their service here and now,” says Claus Thorsgaard, CEO of Conscia Group.

It also means that we can take a proactive role and propose new solutions for customers in other industries"

“The ability to build secure solutions that allow our customers to unlock the power of the data they possess in the production networks gives us exciting opportunities for efficiency and new business models. It also means that we can take a proactive role and propose new solutions for customers in other industries, and thereby let them take part in experiences and opportunities they may not have thought of,” says Lars Kyhlstedt, Managing Director, Conscia Sweden.

Connecting different devices

“It is only when it is possible to connect really many devices quickly and safely - whether it is lathes in a factory or speakers in a school - that you can realise the significant potential of networked intelligence. Cisco's modern, secure, efficient, and flexible networks enable this and therefore we are very pleased that Conscia with its extensive expertise in the latest technologies is now our first IoT Advantage Partner,” says Niklas Andersson, Vice President, Cisco EMEAR North.

The term IoT - Internet of Things - encompasses many different solutions for connecting different devices and things. The need for data collection from deployed units such as real estate systems, industrial units, control systems or equipment in healthcare has traditionally often been handled completely separated from classic IT.

Handling IoT security

Proprietary protocols and requirements for how, for example, locks, industrial robots or X-ray machines need to communicate often result in one unique solution per need.

Another major challenge is that high competence is required to handle IoT security without a simplifying tool

The requirement to constantly add more and new devices, protocols and data collection points can lead to an almost exponentially increased burden in the handling of each new function that is to be connected - especially if security is to be taken into account. With Conscia DevicePortal, it is possible to manage security in a fast and efficient way when onboarding and handling IoT devices. Another major challenge is that high competence is required to handle IoT security without a simplifying tool, such as Conscia DevicePortal.

Reliable communication solutions

With Conscia DevicePortal, other IT personnel, who do not have special skills, can handle the work, says Ola Magnusson, Head of Group IT Infrastructure at Suzuki Garphyttan, a manufacturer of valve spring wire for car engines and transmission solutions.

Cisco is a pioneer in communications and networking, offering a strong suite of IoT products and solutions. Whether it's specific and rugged products that can handle the outdoor environment or platforms like Cisco Cybervision to provide an overview and security, they take advantage of their deep knowledge of how to build scalable and reliable communication solutions.

Stay ahead in the era of intelligent security systems powered by Artificial Intelligence with our special e-magazine on AI in security.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Industrial security
  • Healthcare security
  • Security management
  • Security devices
  • Network monitoring
  • Identity management
  • Industrial security systems
  • Security service
  • Security communication
  • Ruggedized products
  • Mobile communications
  • Internet of Things (IoT)
  • Outdoor Security
  • Data Security
  • Power Supplies
  • Related links
  • Access Control Software Access control software
  • Biometric Access control software
  • GSM Intruder alarm communicators
  • Broadcast Messenger Access control software
  • Contact Access control software
  • Radiowave Intruder alarm communicators
  • TCP / IP / GPRS Intruder alarm communicators
  • Central Monitoring Option Access control software
  • Smart Card Access control software
  • TCP/IP Intruder alarm communicators
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • Issuance and identification system Access control software
  • Management Systems Upgrade Access control software
  • Remote software for telecode door entry phone system Access control software
  • Visitor Management tool Access control software
  • Related categories
  • Power supplies & batteries
  • Access control software
  • Intruder alarm communicators
Related white papers
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Allegion's LCN Senior Swing with AdaptivIQ on exhibit at ISC East 2025

Amthal celebrates 25 years in security excellence

Amthal celebrates 25 years in security excellence

Detection Technology wins 2025 GE HealthCare Award

Detection Technology wins 2025 GE HealthCare Award

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Healthcare security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec