HRH Prince Michael of Kent on Dedicated Micros' stand at IFSEC
Dedicated Micros demonstrated their industry-leading CCTV capabilities to HRH Prince Michael of Kent at IFSEC 2009
Dedicated Micros - part of AD Group - was delighted to be able to welcome HRH Prince Michael of Kent to its stand during the recent IFSEC 2009 exhibition, at the NEC in Birmingham, to see the company's CCTV technology at first hand.

On the opening day of IFSEC 2009, the Royal guest was given a tour of Dedicated Micros' stand and shown some of the latest surveillance solutions by Mike Newton, founder of Dedicated Micros and CEO of AD Group, and Pauline Norstrom the company's Director of Worldwide Marketing and AD Group Director.

HRH Prince Michael of Kent had earlier met Mike Newton and Pauline Norstrom whilst attending the British Security Industry Association (BSIA) 'Meet the Buyers' event in his capacity as Patron of the BSIA's Export Council.

Said Mike Newton, founder of Dedicated Micros: "We were privileged to be able to demonstrate our industry-leading CCTV capabilities to HRH Prince Michael of Kent, particularly given his long-standing interest in the security industry and its important contribution to the UK economy."

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...