TOP
Talked to
Netherlands_Jeroen van Os
Jeroen van Os
Channel Partner Manager

What kind of security set ups do many companies tend to have?

Some companies have an ecosystem of integrated technologies such as access control, intrusion detection and video management. Others have one standalone security system, often with limited or no options for integrations. And others use of a variety of unconnected systems, which can make it very difficult to keep control of monitoring and managing them and lead to security vulnerabilities.

Is it better to have a physical access control system with integrations or a standalone security system?

We believe it’s far better to use a high-quality physical access control system and then integrate the other technologies you need. The danger of using a standalone security system with limited options for integrations is that it might suit your needs now, but what if it doesn’t in the future? You may have very few options for adapting your system and, or, be restricted to using technologies from that particular vendor.

 

 

What are the advantages of using an open platform with integrations?

If you choose a physical access control system based on an open platform, like AEOS, you’re free to integrate high-quality technologies developed by other specialist vendors. As well as your existing systems and homegrown technologies and processes.

This means you can set up your ecosystem up to suit your specific needs. And if your circumstances change or the world changes – if we have another pandemic, for example – you can adapt your system quickly and easily. It also makes it easy and cost-effective to scale your system if you need to add new locations around the world.

 

Does Nedap sell complementary technologies for AEOS access control?

Many manufacturers of physical access control systems aim to offer a complete portfolio by developing their own complementary security solutions. But the downside is that it’s difficult to be the best at everything, so the systems offered may be sub-standard. And you may be locked into the technologies from that vendor.

We prefer to take a best-of-breed approach where every piece of technology is developed by specialists. So, we stay focused on developing and updating AEOS, our physical access control system. And we collaborate with other specialists, through our  Technology Partner Programme, to ensure end-users have a wide choice of high-quality integrations for AEOS. For example,   biometric identification, visitor management, mobile access and more.

This approach means every element of your security ecosystem can be the best of its kind; they’re all selected by you to suit your needs; and they work together seamlessly. It also allows you to really streamline your operations and increase convenience for operators and end users.

 

What other challenges or concerns do companies tend to have relating to security integrations?

Aside from the challenges I’ve just mentioned, we find some key concerns are around version control and functional compatibility. These are valid because, if one element of your system is unreliable, it can cause serious weaknesses in your security. That’s why we test rigorously to ensure our partner technologies are compatible with AEOS and we issue regular updates.

Other concerns and challenges relate to who is responsible for what and how to choose the right technologies. With AEOS, we make it easy to integrate technologies technically because we use an open platform ­– but that’s not the end of the story.

We’ve built strong partnerships with system integrators around the world through our network of channel partners. They’re the only companies authorised to sell, install and maintain AEOS. It means end customers always have access to experienced guidance and have a choice of experts to consult. Companies are also welcome to come to us at Nedap for advice. And we’re happy to demonstrate integrations and provide information on their features and benefits, and other things to take into consideration.

More news

Interested in security management technology trends?

Be a security expert