Archive


2014  ⏷

November 2014: Feature Articles

  • Practical surveillance guidelines
  • Passengers, security and international air travel
  • Securing an icon
  • Creating synergistic guarding support
  • Analysing video analytics
  • Verifying employee information for fraud prevention


October 2014: Feature Articles

  • Creating a secure financial sector environment
  • Is finance available in the security sector?
  • Thermal imaging for port security
  • Thermals secures largest airport in Germany
  • Next-generation EnviroMist/GreenMist technology
  • Improve guard management with data
  • Image stabilisation examined
  • Improved security coverage in hypermarket chain
  • Success lies in technology integration
  • To maintain or not to maintain


September 2014: Feature Articles

  • From POPI to profit
  • The convergence of industrial security and life safety
  • Turning up the heat on solar field security
  • Choosing a standards-compliant installer
  • Ensuring your fire/smoke installation is up to par
  • Wireless technology grows in popularity
  • Perimeter security essentials – III
  • Unlocking key management


August 2014: Feature Articles

  • Healthcare security without the complexity
  • Integrated management platforms
  • Poor playback undermines CCTV advances
  • Nothing in common makes a good match
  • Access control predominates in healthcare
  • The ultimate guide to PSIM
  • ROI is not a four-letter word
  • High-end surveillance storage
  • The right drive for surveillance
  • Perimeter security essentials – Part 2
  • Turning security alarms into social alarms
  • A look into the cybercriminal underground
  • Tips to reduce network congestion
  • The future is bright


July 2014: Feature Articles

  • A ruinous amendment?
  • Overcoming security isolation
  • Wide scope for remote ­monitoring services
  • A boom market for suppliers
  • An integrated approach to entertainment security
  • Safer ship travel with XProtect
  • Making security systems pay for themselves
  • IFSEC SA 2014 gets it right
  • Perimeter security essentials
  • Security and cloud computing


June 2014: Feature Articles

  • Security product training in South Africa
  • South African SIs face stiff competition
  • Mining sector adopts multi-tiered security approach
  • The challenge of effective retail security
  • The incidentals of incident ­handling


May 2014: Feature Articles

  • Integrated security features strongly in parastatals
  • Residential estate security a mixture of people, processes and technology
  • A building on your smartphone
  • Tracking and managing people and assets
  • Cash risk shift


April 2014: Feature Articles

  • Technology can transform the public safety
  • How integrated is commercial security?
  • Keeping data secure
  • Mobile security from the cloud
  • Smartcard solutions for higher education
  • Out of office mobile security
  • Securing your IT infrastructure
  • Big data’s next conquest: physical security


March 2014: Feature Articles

  • Smart surveillance principles and acceptance
  • IP gaining ground in retail security
  • Ten strategies to maximise store productivity
  • Cash management systems keep money safe
  • Securing cash in transit
  • Integrated systems beat the alarm blues
  • Video surveillance has come of age
  • Home automation means integration
  • Key and asset management tips
  • Top five business continuity risks for 2014
  • FM trends in 2014: Beyond buzzwords


February 2014: Feature Articles

  • Offsite and on the ball
  • Wireless jamming investigated
  • Electric fencing standards lead the way to safer installations
  • Detection in all situations
  • The role of humans in CBD and city surveillance
  • The components of city ­surveillance
  • Security for Monaco


January 2014: Feature Articles

  • Residential security in the spotlight
  • CAMPROSA conference 2013
  • Integrated school surveillance
  • Products of the Year 2013