AESCO allows system integrators to cost-effectively lift the security of an existing deployment
Idesco's AESCO is the world's first encryption solution for reader-host data transfers

Earlier this spring while preparing to launch AESCO, Idesco learned a number of the Scandinavian region's major integrators had quietly expressed an intense interest in the world’s first encryption solution for reader-host data transfers. This interest only intensified after the cutting edge innovation's launch.

Nevertheless, AESCO's recent and subsequent nomination to the Access Control category for the prestigious Detektor International Award took Idesco's CEO, Jari Valtonen, pleasantly, by surprise. "Just being nominated has been a real honor for all of us, even while I know our design and engineering team so richly deserve it. They're not just a talented team of professionals. Once again, their innovation is showing the way for the rest of the industry. It's a real privilege for me to work with them."

AESCO is rapidly becoming a powerfully compelling innovation for the industry because it allows system integrators to profoundly and yet cost-effectively lift the security of an existing deployment - while leaving the site's existing controllers and system undisturbed. Even transponder migration under the scheme is streamlined by the product.

The category's award recipient, will to be chosen on September 21 at Skydd 2012, in Stockholm, Sweden, where Idesco will also be exhibiting.

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...