Government and Parastatal (Industry)



Data security is essential for Government
May 2015, Information Security
Cybercrime is a burgeoning threat, not only to business but also to governments all over the world. The increasing number of highly publicised examples of cybercrime highlights this trend.

Read more...
Integrated security features strongly in parastatals
May 2014, Technews Publishing
Just as private organisations depend on security systems to monitor activities in and around their premises and to control the access of people into their facilities, parastatals have similar needs. Hi-Tech Security Solutions spoke to Telkom and CSIR about the changing face of security in their domain.

Read more...
Old meets new: Public sector identity management
May 2014
Along with the increased mobility of people which must be facilitated, governments must also deal with threats such as organised crime, illegal immigration and cybercrime.

Read more...
Integrated border management
May 2014
Gemalto launches integrated border and visa management solution for fast, reliable and secure immigration control. The solution integrates platforms, software and services to enhance security of border check points and significantly reduce waiting times through automated document verification and border control systems.

Read more...
Guidelines for key control in correctional facilities
May 2014
At correctional facilities, the environment is highly structured to ensure that security, safety and order can be maintained. Security procedures are clearly defined and include among others, head counts, inmate movement tracking, visitor logs and cell inspections.

Read more...
Local manufacturing by the numbers
May 2013, News & Events
Hedley Davidson unpacks the realities of local manufacturing by the numbers, having been locally designing and manufacturing electronic access control since 1989. This article focuses on his belief that South African companies have the necessary ingredients to bring internationally competitive products to market.

Read more...
Effective integrated security solutions
March 2013, Integrated Solutions
Government organisations need assistance in managing their varied disciplines through the use of technology, software solutions, measurable management of service providers and staff, and proper beneficial integration of the three pillars, namely 'people, process and technology'.

Read more...
Securing complex sites since 1929
March 2013, Elvey Security Technologies , Access Control & Identity Management
Government institutions are notoriously difficult to secure. They require a specialised system that will ensure the safety and security of employees and the back office while accommodating a constant flow of visitors in and out of the premises without hindering public access or infringing on people’s privacy.

Read more...
Dallmeier records petroleum security
March 2013, Surveillance
For many years the TPAO, Turkish Petroleum Corporation, has used recording devices by Dallmeier. When the system was expanded, a decision was made once again in favour of recording servers by the German CCTV IP specialists.

Read more...
Forty ways of embezzlement
March 2013, News & Events
As much as greed, it is often said that the identity crisis of an anonymous ­government job prompts individuals to assert themselves in such a manner.

Read more...
High security access at nuclear site
Access & Identity Management Handbook 2013, Gallagher, Access Control & Identity Management
Security is layered throughout the organisation and is structured around various security grades of facilities. The Gallagher security integration platform (formerly Cardax FT) is the backbone of electronic access control and intruder alarms at ANSTO.

Read more...
Security and safety in Indonesia
1 August 2012, Bosch Building Technologies, Integrated Solutions
The company PT Pelabuhan Indonesia specialises in handling containers for international and domestic transportation in many ports in Indonesia. Due to harsh seaside conditions amidst facilities like container cranes and hypermodern cranes, they require top-class security equipment to ensure safety of employees.

Read more...
Thinking out of the booklet
May 2012, Access Control & Identity Management
In every country, including South Africa, border security is thus coordinated among dozens of top-dog agencies from the military, police, intelligence, home office, foreign office, immigration, customs, health, exchange regulators, drug enforcement and anti-terrorist squads.

Read more...
Crime-fighting surveillance
CCTV Handbook 2012, Bosch Building Technologies, Surveillance
It has not been easy in the New York area, where there has been a consistently high volume of criminal activities around the perimeters of developments and in elevator cabs operated by New York City Municipalities.

Read more...
Olsztyn courthouse
CCTV Handbook 2012, Carrier Fire & Security South Africa , Perimeter Security, Alarms & Intruder Detection, Surveillance
The advanced access control system secures over 40 doors and is based on ATS1250 controllers, offering exclusive access to card holders. In order to build the CCTV solution, over 90 cameras were connected to eight high-capacity recorders.

Read more...
Nigerian debt management office secured
Access & Identity Management Handbook 2012, Tyco Security Products - Johnson Controls, Access Control & Identity Management
CEM S610f fingerprint card readers and advanced Power over Ethernet solution used to secure offices. CEM Systems, a brand of Tyco Security Products, today announced that the CEM AC2000 Lite security ...

Read more...
Applied biometrics
August 2011, Ideco Biometrics, Access Control & Identity Management, Financial (Industry)
Unveiling the value of fingerprint-based identification. Investment in biometric-based technology to better protect resources is on the rise. Experts in the field of biometric identity management solutions ...

Read more...
Keeping courts secure
CCTV Handbook 2011, Surveillance
Dallmeier secures 120 court buildings in South Africa. More than 120 court buildings across South Africa will each be equipped with a comprehensive security system. Reliability, easy maintenance and, ...

Read more...
Keeping Pietermaritzburg safe
CCTV Handbook 2011, Integrated Solutions
Identifying and apprehending criminals requires concerted effort from multiple parties. CCTV is playing an increasingly important role in the detection of criminal activity and the apprehension of the ...

Read more...
HID Global RFID module chosen by DESKO
24 March 2011, Access Control & Identity Management
HID Module supports both basic and more secure extended access control and is one of industry’s fastest solutions for biometric passport reading

Read more...



<< First   < Previous   Page 4 of 6   Next >   Last >>