2018  ⏷

November 2018: Feature Articles

  • 2018 product highlights
  • Border security: Technology or barriers?
  • How close has video analytics grown to AI?
  • Managing business continuity and disaster recovery
  • NEC XON talks Industry 4.0 and disruption
  • Optimal selection of CCTV operators
  • Our dependence on cyber-connectivity
  • The building blocks of safe and smart cities
  • The latest X-ray scanning solutions

Access & Identity Management Handbook 2019

October 2018: Feature Articles

  • A platform for enabling IoT ­solutions
  • Basic cyber hygiene practices
  • Breaking par for security at ­Woodhill
  • Digital banking crime statistics
  • Effective edge security needs to be holistic
  • Keeping guarding personnel on mines safe
  • Multiple cameras, one licence
  • Securing edge devices and the data they contain
  • There’s more than one approach to video verification
  • Thermals with analytics are a ­winning combination
  • Wise choices decrease fire risks

September 2018: Feature Articles

  • Cameras in the control room
  • Integrated anything
  • Making the right security decisions
  • Securing cargo for export
  • TAPA 2018 sponsors
  • The ever-changing dynamics of risk management
  • The human factor in control rooms
  • The most important features of a management platform

August 2018: Feature Articles

  • Buy local and unlock vast economic empowerment
  • Control physical access to rack level
  • Facing the cybersecurity challenge
  • iPulse rolls out Access Control-as-a-Service
  • Security in healthcare
  • The importance of CCTV training
  • The tough keep going

Residential Estate Security Handbook 2018

July 2018: Feature Articles

  • Advances in NVR and VMS capabilities
  • CCTV reviews and the display of relevant information
  • Protecting the machines
  • Securex 2018 pulls the (right) crowds
  • Securing your digital assets
  • SLAs - Read the fine print
  • The generations that matter
  • Where safety, security and Industry 4.0 meet

June 2018: Feature Articles

  • Bringing different systems into a cohesive solution
  • Data governance and security
  • Guarding your time with WFM solutions
  • Intelligence and compliance ­depend on data governance
  • PoPI and the role of biometrics
  • Simplicity, standards and predictability
  • The dark side of the Internet
  • What is your CCTV really trying to do?

May 2018: Feature Articles

  • Best practices in intruder prevention
  • Combating the evolving threat of fraud
  • Make sure the channels are safe
  • Making cents out of the security mix
  • More of the same, but more sophisticated
  • Residential estate security conference 2018
  • The human factor in decision making
  • Trust, but verify

Securex 2018 Official Event Guide

April 2018: Feature Articles

  • EU GDPR biometric compliance systems
  • Fun, games and security
  • How to maintain cybersecurity across all your devices
  • Multiple secure credentials in your hand
  • Reducing false alarms with Deep Learning
  • Social dynamics to stop crime ­before it happens
  • Unlocking the potential of smart locks and key management

CCTV Handbook 2018

March 2018: Feature Articles

  • An insider eye on retail security
  • Cash crimes escalate
  • Cyber-securing physical security
  • Extracting value from security
  • Keep your guard up

February 2018: Feature Articles

  • Anticipated trends in CCTV for 2018
  • Campus security must not fall
  • Cybersecurity trends 2018
  • Decrypting encryption
  • Let me out of here
  • TAPA SA conference 2017
  • What lies ahead in 2018?