Archive


2005  ⏷

December 2005: Feature Articles

  • Securex 2005 in the spotlight at EXSA awards function
  • A new dimension in fire detection
  • A two-prong approach to prison safety and security
  • Combatting corruption and improving service delivery
  • Image generation: sensors and scanning - A guide to IP video, Part 3
  • Next-generation installer support for the IP world
  • Safe and secure
  • The acquisition, care and feeding of security consultants
  • The convergence of physical security and IT: integration lessons - what the private sector can learn from the CAC Project
  • Video surveillance in the retail sector - effectively combating crime


November 2005: Feature Articles

  • CBR 10 Most Influential - Wireless
  • Co-operation and systems integration: key to improved security for the banking industry
  • Eye spy with IP - an industry overview of what is in store for IP surveillance systems
  • From VCRs to IP-surveillance
  • Security solutions for the mid-size company
  • Setting the global pace from South Africa
  • The convergence of physical security and IT - integrating physical and IT security management (Part 2)
  • The evolution of video surveillance: a guide to IP video - Part 2
  • Why control rooms fail


October 2005: Feature Articles

  • Making the right connection for digital CCTV
  • Most influential access control
  • Moving towards broad-based BEE
  • Safety first
  • The convergence of physical security and IT - integrating physical and IT security management


Access & Identity Management Handbook 2005



September 2005: Feature Articles

  • Erratum
  • FREE surveillance incident management technologies and processes breakfast
  • Spoornet invites suppliers to participate in a request for information on railway vehicle tracking system
  • 2005 Top Security Brands: the selection process
  • CBR 10 Most Influential - Networking
  • CBR 10 Most Influential - Security
  • CBR 10 Most Influential - Storage
  • ESSA debuts in September 1995
  • Internet-connected security systems: just how safe are they?
  • Management vs security: how management undermines security effectiveness
  • Public areas and stadia: what is the point of a security system if you cannot identify the culprits?
  • The convergence of physical security and IT: bottom line
  • Top 10 security products of 1995
  • Top 10 tech news of the past 10 years


CCTV Handbook 2005



July 2005: Feature Articles

  • Do not be a dodo
  • How well do you know your partner?
  • Life on the safe side
  • The convergence of physical security and IT: internetworking
  • The key future trends in CCTV
  • Video over IP likely to play major role in future CCTV surveillance


August 2005: Feature Articles

  • Benchmarking CCTV performance through audits
  • Novel access control solution at RM
  • Terror in the city
  • The convergence of physical security and IT: internetworking - Part 2


June 2005: Feature Articles

  • Success in the security industry
  • Automation an essential component of effective mine security systems
  • Confessions of a CTO
  • Convenience vs security: How well do biometrics work?
  • Intelligent technology is in your CCTV systems' future
  • Nerd, techie, specialist, guru or expert ... which do you need?
  • Security a top priority at Mount Isa Mines
  • The convergence of physical security and IT: responsibilities
  • The seven deadly sins of real-world backups


April 2005: Feature Articles

  • Card games
  • Deciding on the extent of surveillance coverage
  • Effective risk management
  • Endpoint security end game
  • Park safe
  • Pentagon-like security and BMS at Hollard's new HO
  • Q&A


May 2005: Feature Articles

  • Success in the security industry
  • CCTV does not reduce crime
  • Facial recognition Q&A
  • Facing up to a new world order
  • New generation DVRs
  • Putting the 'I' back in ID
  • The evolving world of access control systems
  • The successful use of CCTV (or not) – lessons from UK research
  • Top five myths of outsourcing e-mail security


February 2005: Feature Articles

  • Success in the security industry
  • Picking your way through the legal minefield
  • SA's first security city
  • Security for systems in networked and standalone environments
  • Unified approach needed for secure content management