Consultants
740Companies
1327Locations
Compact but powerful, the new Control Desk DUETTO brings together highly developed functionality and superior flexibility. Designed as a space-saving master Intercom station for desktop use or wall-mounting, it combines IoIP and SIP to provide the best of both worlds. The DUETTO integrates Control Desk solutions with building automation, video communication and video surveillance. As a result, it opens up a world of possibilities for visitor management with excellent video-enhanced communication, even in areas with limited space. Perfect communication via Intercom and telephone.
Find Out More >>
ICX-500 Gateway is an integrated Intelligent Communication (IC) Gateway connecting people, devices & systems at unrivaled levels of manageability, scalability, robustness and interoperability.
ICX-500 offers:
Integrated IC Management & Security
Streamlined and unified management
Built-in Cyber Security Trusted Platform
Scalability & Robustness
State of the art quad-core processing capacity
Supports up to 552 IC devices per node
Solid design with no moving parts
Interoperability
Supports industry standards
Multiple Certified Platform and Device Integrations
Native API & Cloud connectivity
Find Out More >>
John brings over 27 years of technology and telecommunications experience in the industry. He specializes in Enterprise Secure Access and Video Surveillance, Unified Communications, Networking and VoIP, Telephony, Call Centers, Data Centers, Network Infrastructure, Corporate Audio/Visual Systems, Wireless and Carrier Services. As a Security, Communications and Design Consultant, his responsibilities include design, specification development, budget creation, procurement, Construction Administration, including project management, implementation oversight and quality control.
Phone: +1 877 854-8403
Email: john.weston@unified.us.com
Linked-In: www.linkedin.com/in/john-weston-5657578
The security consultant is a vital link between a building or facility’s requirement for security and the successful installation of a system to meet that requirement. From risk assessment to security audit to system design to the details of implementation and practice, it is the security consultant who identifies, then turns requirement into reality. SecuritySpecifiers allows a variety of constituencies – OEM's, integrators, facility owners and operators, end-users, and architectural firms – to access an up-to-date listing of companies and individuals skilled in the design and specification of physical security systems.
Search Consultants
Find Products and Manufacturers