Download PDF version Contact company
AESCO allows system integrators to cost-effectively lift the security of an existing deployment
Idesco's AESCO is the world's first encryption solution for reader-host data transfers

Earlier this spring while preparing to launch AESCO, Idesco learned a number of the Scandinavian region's major integrators had quietly expressed an intense interest in the world’s first encryption solution for reader-host data transfers. This interest only intensified after the cutting edge innovation's launch.

Nevertheless, AESCO's recent and subsequent nomination to the Access Control category for the prestigious Detektor International Award took Idesco's CEO, Jari Valtonen, pleasantly, by surprise. "Just being nominated has been a real honor for all of us, even while I know our design and engineering team so richly deserve it. They're not just a talented team of professionals. Once again, their innovation is showing the way for the rest of the industry. It's a real privilege for me to work with them."

AESCO is rapidly becoming a powerfully compelling innovation for the industry because it allows system integrators to profoundly and yet cost-effectively lift the security of an existing deployment - while leaving the site's existing controllers and system undisturbed. Even transponder migration under the scheme is streamlined by the product.

The category's award recipient, will to be chosen on September 21 at Skydd 2012, in Stockholm, Sweden, where Idesco will also be exhibiting.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?