SMART Security Solutions Magazine


Featured articles


AI-driven identity verification for access control
Facial authentication solutions combine advanced AI and 3D sensing technologies with ease of use to create a frictionless, touchless experience. The deployment of this technology in an access control system keeps users and administration moving.

Read more...

Tips and tools for trade businesses
ServCraft brings together trade industry associations and corporations to launch blox, a digital content platform and community impacting lives, businesses and industries across hundreds of thousands of trade business SMEs.

Read more...

Research labs secured with STid Mobile ID
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...



AI augmentation in security software
Risk Management & Resilience

The integration of AI technology into security software has been met with resistance. In this, the second of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.
read more


Milestone XPerience Day South Africa
Milestone Systems, News & Events

The 2024 Milestone XPerience Day in Johannesburg took place on 01 February 2024, where the video technology sector’s brightest and best minds gathered to share information and networking.
read more


Passwordless, unphishable web browsers
Access Control & Identity Management, Information Security

Passkey technology is proving to be an easily deployed way to bring unphishable, biometric-based security to browsers; making identification and authentication much more secure and reliable for all parties.
read more


Linking of security officers by security businesses
PSiRA (Private Security Ind. Regulatory Authority), News & Events, Risk Management & Resilience

[Sponsored] By law, all security businesses are required to declare their employees to PSiRA so that they can be accounted for administratively. Failure to link employees by security businesses is a contravention of the Code of Conduct and a criminal offence.
read more


Protecting our most vulnerable
NEC XON, Access Control & Identity Management, Products & Solutions

In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.
read more


Understanding the power of digital identity
Access Control & Identity Management, Security Services & Risk Management, Financial (Industry)

The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.
read more


Next-gen solar-powered switches
Infrastructure

Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.
read more


Access and identity in 2024
Technews Publishing, Gallagher, HID Global, IDEMIA , Ideco Biometrics, Enkulu Technologies, neaMetrics, Editor's Choice, Access Control & Identity Management, Integrated Solutions

SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.
read more


A new dawn for physical security in Africa
Access Control & Identity Management

Africa’s diverse socio-economic landscape requires biometric access control and workforce management for blue-collar workers with functions like authentication, identity verification, visitor management, and time and attendance tracking.
read more


Access Selection Guide 2024
Access Control & Identity Management

The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.
read more


Prepare for cyber-physical attacks
Gallagher, Information Security, Access Control & Identity Management

As the security landscape continues to evolve, organisations must fortify their security solutions to embrace the changing needs of the security and technology industries. Nowhere is this more present than with regard to cybersecurity.
read more


Authentic identity
HID Global, Access Control & Identity Management

As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.
read more


Directory of access and identity management suppliers 2024
Access Control & Identity Management

The Directory of Access and Identity Management Suppliers 2024 includes the details of companies that provide products, advice and services to the access control and identity management market.
read more


Prioritising student safety and operational efficiency
Gallagher, Education (Industry)

With an emphasis on student safety, cybersecurity, asset protection, and facility optimisation, Gallagher’s integrated security system provides a comprehensive solution for schools, ensuring the safety of students, staff, and visitors.
read more


Securex has moved to June
Technews Publishing, Editor's Choice, News & Events

Following the formal announcement of the date for South Africa’s national election, 29 May 2024 , which happened to be in the middle of the planned dates for Securex South Africa, Securex will now take place from 11 – 13 June 2024 at Gallagher Estate in Midrand.
read more


Entries to southern Africa OSPA Awards now open
Technews Publishing, Securex South Africa , Editor's Choice, News & Events

The southern Africa OSPAs are part of a global awards scheme that recognises and rewards teams, individuals and organisations for their commitment and outstanding performance within the security sector.
read more


AI augmentation in security software and the resistance to IT
Security Services & Risk Management, Information Security

The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.
read more


Navigating South Africa's cybersecurity regulations
Sophos, Information Security, Infrastructure

[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.
read more


Biometrics Selection Guide 2024
Access Control & Identity Management

The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.
read more


Unleash the full potential of AI at the edge
Suprema, AI & Data Analytics, Access Control & Identity Management

Efficient AI algorithms, when embedded in edge access control devices, enable companies to optimise their use of AI and edge processing to deliver reliable and fast authentication.
read more


Cloud-based access for finance
Secutel Technologies, Access Control & Identity Management

Experience a new level of secure access control with NOKEY, tailored for banking environments, ATM cubicles, and safeguarded spaces. The cloud-based system offers effortless administration, control, and access management.
read more


PSiRA Introduces the printing of certificates as an interim measure
PSiRA (Private Security Ind. Regulatory Authority), News & Events, Risk Management & Resilience

[Sponsored Content] The introduction of digital certificates was welcomed by the security industry; however, it also led to the exploitation of unsuspecting clients by third parties who print certificates at exorbitant fees.
read more


Different fences for different farmers
Gallagher, Perimeter Security, Alarms & Intruder Detection, Agriculture (Industry)

Far beyond the simple delineation of boundaries, fencing serves as a dynamic solution to address various needs, from ensuring the security of farms and protecting livestock to defining property lines and enhancing aesthetic appeal.
read more


Solar: renting vs. buying
Power Management

Understanding the differences between owning and renting a solar system becomes essential as we navigate the landscape where cost-saving and uninterrupted power supply meet environmental consciousness.
read more


Enhanced cellular connectivity is critical for farm safety
Infrastructure, Agriculture (Industry)

In South Africa, the safety of our rural communities, particularly on farms, is a pressing concern. Nearly 32% of South Africa’s 60 million people live in these areas, where security challenges are constantly in the spotlight.
read more


The song remains the same
Sophos, Information Security

Sophos report found that telemetry logs were missing in nearly 42% of the attack cases studied. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide their tracks.
read more


Revolutionise your security with integrated solutions
Secutel Technologies, Products & Solutions, Surveillance

By merging the capabilities of SecuVue and Secutraq, Secutel has forged a robust system empowering users to fine-tune analytics and harness facial recognition, pose detection, and XFS, among other features.
read more


Stafix focuses on local manufacturing
Perimeter Security, Alarms & Intruder Detection

Stafix Security Centres is a South African-owned company committed to providing customers with a choice of quality imported and locally manufactured products that meet the needs of the electronic security market.
read more


Upgrading security at lifestyle estate
Turnstar Systems, Access Control & Identity Management

Lifestyle estates are often located in out-of-town settings, and living away from the hustle and bustle of the city can be conducive to a relaxing lifestyle. However, it requires a high level of security to keep residents secure.
read more


Securing easy access
Suprema, neaMetrics, Access Control & Identity Management

Securing access to hospitals and healthcare institutions presents a unique set of challenges, because these facilities operate 24/7, have highly ‘open’ access in public areas and require a strict level of security.
read more


Lock down your access control with Alcatraz AI
C3 Shared Services, Healthcare (Industry), Access Control & Identity Management, AI & Data Analytics

Alcatraz AI, represented in South Africa by C3 Shared Services, changes access control by harnessing the power of artificial intelligence and analytics at the edge, where facial recognition becomes the essential credential autonomously.
read more


Global strength, local craft
Impro Technologies, Editor's Choice

Impro Technologies is a resounding success story. Started in South Africa, the company remains true to its roots and still designs and manufactures its access control systems and solutions in the country.
read more


Protecting organisations against fraud losses caused by ghost employees
Risk Management & Resilience

Several key South African organisations are potentially incurring significant losses due to 'ghosts’; ghost employees who exist on paper within business or government departments, but not in real life.
read more


South Africa shows a 1200% increase in deepfake fraud
News & Events, Risk Management & Resilience

Sumsub released its third annual Identity Fraud Report of the year, analysing identity fraud across industries and regions based on millions of verification checks across 28 industries and over 2 million fraud cases.
read more


Effective access control
Flow Systems, Access Control & Identity Management, Products & Solutions

Flow Systems has introduced its new Extra Heavy Duty Industrial Rising Vehicle Barrier, which provides a high level of protection. It is a traditional-looking control barrier with the benefits of high-level physical protection.
read more