Archive



2012  ⏷

November 2012: Feature Articles

  • A converged approach to enterprise security
  • Assets on track
  • Convergence is now
  • Keeping data safe and accessible
  • Video analytics in the spotlight
  • Video analytics: the definitive 5-point guide


October 2012: Feature Articles

  • Do consultants add value?
  • The frustration and dangers of queues
  • Who are you really?
  • You can bank on this


Access & Identity Management Handbook 2013



September 2012: Feature Articles

  • A new approach
  • Camera buyers' guide
  • Challenges and opportunities for the security manager
  • Lighting for network cameras
  • Modular fire alarm
  • More than simple security
  • Secure your business, not only your premises
  • The future of the security manager
  • Wireless networking in security


August 2012: Feature Articles

  • A comprehensive security risk assessment
  • Back to the future: new owners, new drive, new vision
  • Bandwidth and storage considerations
  • Biometrics and future trends in one sitting
  • Defining integration
  • IP integration watches the media
  • It is inside and it is on top
  • Monitoring large-scale events
  • Overall positive vibes at IFSEC SA
  • The role of security manager in 2012
  • Turning the tide on The Gap's darker side
  • Virtual credentials


July 2012: Feature Articles

  • Adding value for customers
  • Beyond conventional security
  • Cengence secures Nissan SA
  • Extracting value from security
  • Five takeouts from IFSEC UK
  • IFSEC UK brings in the crowds
  • innoVIZION set to change national retail operations with CGCSA
  • Keeping tabs offsite
  • Let their finger do the talking
  • Reducing shrinkage
  • There is life in that analogue system


June 2012: Feature Articles

  • Your local proven solutions provider
  • A mix of technology and people
  • A unique challenge
  • IFSEC 2012 preview
  • IFSEC SA is here
  • Integration is the norm
  • Providing overall security
  • Security perception vs reality
  • Turning data into business information


May 2012: Feature Articles

  • Service and track record the differentiators
  • Thinking out of the booklet
  • Tracing and authenticating items


CCTV Handbook 2012



April 2012: Feature Articles

  • Alarms become more interactive
  • Data security is not optional
  • Evaluating CCTV operational performance delivery
  • Gambling on technology
  • Secure data storage
  • Securing IT systems
  • Security begins with the basics
  • The identity conundrum
  • The RSA Security breach


March 2012: Feature Articles

  • Adoption of wireless technology
  • Convergence rules
  • DAS, NAS, SAN, RAID - who cares?
  • DVR/NVR round-up 2012
  • Management 101
  • People versus technology
  • The future of physical access control


February 2012: Feature Articles

  • Eyes open in 2012
  • Identity theft is the new black
  • iLegal 2011
  • Looking ahead
  • Planning, personnel and technology
  • Professional staffing of a CCTV control room
  • Trending fire
  • Video analytics for security











While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.