Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


May 2015

PDF   e-Book
  Is VUCA the end of strategy and leadership?
Security Services & Risk Management

In the current era of volatility, unpredictability, complexity and ambiguity, managers need to adapt the way to navigate.

 
  No quick fix for government security
Morpho South Africa, Government and Parastatal (Industry), Enterprise Solutions

While there are a number of commonalities between securing a business facility and securing government and parastatal facilities, there are also a number of elements that require a slightly different approach.

 
  Much ado about a lot
Johnson Controls, Pelco by Schneider Electric, Enterprise Solutions

Building management systems (BMS) offer an enormous amount of value to customers, but the choice of which product to buy or which technology is best is often secondary to the results and value-add the customer gets over the lifespan of their systems.

 
  Keeping track of costs with technology
Asset Management, EAS, RFID

Technology is becoming increasingly important in the driving down of losses within organisations and keeping track of security guards. Hi-Tech Security Solutions discusses two products that are diverse in application but lead to increased control and management.

 
  RFID expands its security credentials
Asset Management, EAS, RFID, News, Enterprise Solutions, Security Services & Risk Management

Many people believe RFID is a limited technology with its best days behind it. Swift is a South African company that has developed a host of innovative solutions integrating RFID, specifically Active RFID and sensor technologies.

 
  How eavesdropping resistant is your organisation?
Security Services & Risk Management

South African businesses must accept that as they attempt to be more competitive in the global markets, that their products, processes, information and trade secrets may come under threat from competitors.

 
  Integrating key control into a networked security system
Access Control, Identity Management

As part of the requirement for the safety and security of people, assets and facilities, the management of keys is a fundamental tactic in controlling access.

 
  Stopping the leak
Information Security

The damage that data loss can do to an inadequately secured enterprise extends far beyond pecuniary matters and can include reputation loss, regulatory consequences, a decrease in customer confidence, trust issues, a drop in market share, and the development of trade barriers.

 
Calendar of events
Cover Story
Securex
News
Access Control
Asset Management, EAS, RFID
Associations
Case Studies
CCTV, Surveillance
Enterprise Solutions
Government and Parastatal
Perimeter Security, Alarms & Intruder Detection
Products
Security Services & Risk Management
System Integration
Training, Conferences & Events

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.