Analyse, automate, and optimise logistics processes
neaMetrics, Surveillance, Transport (Industry), Products & Solutions, Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.
read more
Survey highlights cost of cyberdamage to industrial companies
Kaspersky, Information Security, News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.
read more
Gallagher Security achieves ISO 27001 recertification
News & Events, Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security.
read more
Digital economy needs an agile approach to cybersecurity
Information Security, News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks
read more
Value and industry insight
Securex South Africa , Training & Education, News & Events
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing.
read more
SIEM rule threat coverage validation
Information Security, News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.
read more
Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.
read more
Remote monitoring made easy
Products & Solutions
Links Field Networks offers the wireless P5 Plus Solar outdoor PTZ (pan-tilt-zoom) camera, which is perfect for security monitoring in remote areas. It includes 4G connectivity with a data package.
read more
Cybersecurity a challenge in digitalising OT
Kaspersky, Information Security, Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.
read more
Gallagher Security releases OneLink
Gallagher Animal Management, Products & Solutions, Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.
read more
The dangers of poor-quality solar cables
Security Services & Risk Management, Smart Home Automation
Reports indicate that one in six fires attended by South African firefighters is linked to substandard solar installations, often due to faulty wiring or incompatible components.
read more
Risk management and compliance enforcement
Security Services & Risk Management
Having a risk management and compliance programme (RMCP) is not just a procedural formality; it is a legal requirement under Section 42 of the Financial Intelligence Centre Act (FICA).
read more
A new generational framework
Editor's Choice, Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.
read more
Key design considerations for a control room
Leaderware, Editor's Choice, Surveillance, Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.
read more
The next step-change in fire detection technology is coming
Fire & Safety
Like many industries, fire detection technology’s most recent evolutionary steps revolve around data and connectivity. When coupled with machine learning algorithms or AI, this could underpin the next real step change.
read more
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.
read more
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.
read more
Chubbsafes celebrates 190 years
Gunnebo Safe Storage Africa, News & Events, Security Services & Risk Management
Chubbsafes marks its 190th anniversary in 2025 and as a highlight of the anniversary celebrations it is launching the Chubbsafes 1835, a limited edition 190th-anniversary collector’s safe.
read more
Growing risks for employers
Security Services & Risk Management
With South Africa’s unemployment rate exceeding 32% and expected to rise beyond 33% this year, desperation is fuelling deception in the job market. Trust is no longer a given, it is a gamble.
read more
Safer spaces through smart surveillance
NEC XON, Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.
read more
Seamless visitor management
Secutel Technologies, Products & Solutions
Secutel Technologies recently launched SecuVisit, a cloud-based visitor access control system. SMART Security Solutions asked Secutel’s Norman Pretorius for more information on the product and its capabilities.
read more
24/7 Drone Force
Integrated Solutions
24/7 Drone Force is showcasing the Docked Drone Solution, which utilises unmanned aircraft systems (UAS)/drones designed to conduct remote docking station operations.
read more
Wireless home surveillance
Smart Home Automation
EZVIZ has launched its AOV software alongside the X5S large-capacity storage solution, providing a 360-degree security solution with real-time footage of incidents and recorded evidence when needed.
read more
Open and collaborative logistics systems
Hikvision South Africa, Surveillance, Logistics (Industry), AI & Data Analytics
E-commerce and other high-volume logistics operations need open and collaborative technology ecosystems that drive efficiencies, throughput and digital transformation. Hikvision discusses the benefits of harnessing open and collaborative systems in the logistics market.
read more
Nemtek
Nemtek Electric Fencing Products, Perimeter Security, Alarms & Intruder Detection
Looking for new and exciting advancements in electric fence management? Look no further than Nemtek at stand LN6 this year at Securex 2025.
read more
The state of the VMS market
Arteco Global Africa, Milestone Systems, Cathexis Technologies, Technews Publishing, Surveillance
SMART Security Solutions asked three platform vendors in South Africa, one that is developed and maintained in the country with an international market, for their views on the state of the VMS market and where it is headed.
read more
Wi-Fi security camera with PIR
Ajax Systems, Smart Home Automation
Ajax Systems has introduced the IndoorCam, designed for private households, small offices, and small to medium businesses, equipped with a 4 MP camera, HDR, and IR illumination of up to 8 m.
read more
Dahua Summit 2025
Dahua Technology South Africa, Technews Publishing, SMART Security Solutions, Products & Solutions
Dahua Technology South Africa held its annual summit in Johannesburg in early April. The summit focused on highlighting the company’s range of new products and solutions and recognising its regional partners.
read more
Connected commercial drone market to reach US$37.3 billion
News & Events, Commercial (Industry), IoT & Automation
The global market for connected commercial drones is forecast to grow from US$18.6 billion in 2024 at a compound annual growth rate (CAGR) of 15% to reach US$37.3 billion in 2029
read more
Standards for fire detection
Fire & Safety
Nick Collins discusses standards for commissioning and handing over a fire project once the installation is complete.
read more
Fully-integrated browser AI
News & Events
Opera Mini now provides all its smartphone users with its own free built-in browser AI, Aria, including AI chat, Ask Aria and image generation. According to an Opera survey, 80% of South Africans want AI tools integrated into their browser.
read more
Seven tips to help ensure your backup batteries work
Power Management, Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.
read more
Dahua expands WizColor offerings
Dahua Technology South Africa, News & Events, Surveillance
Dahua Technology has released the newest addition to its WizColor product offerings; equipped with a range of intelligent functions tailored to meet the needs of various scenarios.
read more
Phishing attacks through SVG image files
Kaspersky, News & Events, Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.
read more
JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.
read more