Government and Parastatal (Industry)



High security access at nuclear site
Access & Identity Management Handbook 2013, Gallagher, Access Control & Identity Management
Security is layered throughout the organisation and is structured around various security grades of facilities. The Gallagher security integration platform (formerly Cardax FT) is the backbone of electronic access control and intruder alarms at ANSTO.

Read more...
Security and safety in Indonesia
1 August 2012, Bosch Building Technologies, Integrated Solutions
The company PT Pelabuhan Indonesia specialises in handling containers for international and domestic transportation in many ports in Indonesia. Due to harsh seaside conditions amidst facilities like container cranes and hypermodern cranes, they require top-class security equipment to ensure safety of employees.

Read more...
Thinking out of the booklet
May 2012, Access Control & Identity Management
In every country, including South Africa, border security is thus coordinated among dozens of top-dog agencies from the military, police, intelligence, home office, foreign office, immigration, customs, health, exchange regulators, drug enforcement and anti-terrorist squads.

Read more...
Crime-fighting surveillance
CCTV Handbook 2012, Bosch Building Technologies, Surveillance
It has not been easy in the New York area, where there has been a consistently high volume of criminal activities around the perimeters of developments and in elevator cabs operated by New York City Municipalities.

Read more...
Olsztyn courthouse
CCTV Handbook 2012, Perimeter Security, Alarms & Intruder Detection, Surveillance
The advanced access control system secures over 40 doors and is based on ATS1250 controllers, offering exclusive access to card holders. In order to build the CCTV solution, over 90 cameras were connected to eight high-capacity recorders.

Read more...
Nigerian debt management office secured
Access & Identity Management Handbook 2012, Johnson Controls - (Tyco Security Products), Access Control & Identity Management
CEM S610f fingerprint card readers and advanced Power over Ethernet solution used to secure offices. CEM Systems, a brand of Tyco Security Products, today announced that the CEM AC2000 Lite security ...

Read more...
Applied biometrics
August 2011, Ideco Biometrics, Access Control & Identity Management, Financial (Industry)
Unveiling the value of fingerprint-based identification. Investment in biometric-based technology to better protect resources is on the rise. Experts in the field of biometric identity management solutions ...

Read more...
Keeping courts secure
CCTV Handbook 2011, Surveillance
Dallmeier secures 120 court buildings in South Africa. More than 120 court buildings across South Africa will each be equipped with a comprehensive security system. Reliability, easy maintenance and, ...

Read more...
Keeping Pietermaritzburg safe
CCTV Handbook 2011, Integrated Solutions
Identifying and apprehending criminals requires concerted effort from multiple parties. CCTV is playing an increasingly important role in the detection of criminal activity and the apprehension of the ...

Read more...
HID Global RFID module chosen by DESKO
24 March 2011, Access Control & Identity Management
HID Module supports both basic and more secure extended access control and is one of industry’s fastest solutions for biometric passport reading

Read more...
Securing the post
June 2010
Lebanon’s postal services continuously improves security. Following 17 years of civil war in Lebanon, the government embarked on a massive reconstruction programme in 1993, consisting of rebuilding the ...

Read more...
Security without borders
May 2010, Integrated Solutions
Connecting anyone, anywhere, using any device, with high levels of security. Cisco is tackling today’s enterprise security challenges with a new architecture that will help enable business users to ...

Read more...
National security in Guatemala
January 2010, Surveillance
“Even in poorly lit environments such as hallways, the FD7131s still maintain clear and stable image quality because of the built-in white-light illumination.” The Secretariat of Strategic Intelligence ...

Read more...
Integrated high-tech security lowers risk and costs
May 2008, Johnson Controls, Surveillance
A comprehensive security solution in the commercial sector will include access control, intrusion monitoring and prevention solutions, perimeter protection, fire alarms, CCTV and building management systems

Read more...
Airport security solutions and products
September 2007, Integrated Solutions
The challenges of airport management today are unprecedented. The threat to personnel and civilian life cannot be ignored, the need for strategic thinking and quick decision making is more paramount than ...

Read more...
Private sector helps secure government
August 2007, Elvey Security Technologies , Integrated Solutions
Profound economic and social changes have resulted in the growing trend to outsource functions formerly considered governmental

Read more...
Two-prong approach to prison safety and security
August 2007, Integrated Solutions
Incarcerating ‘troublesome’ individuals is certainly one way of making society safer and more secure. However, it also creates environments – ranging from maximum-security correctional institutions to ...

Read more...
Securing national key points
August 2007, Integrated Solutions
National key points are by definition buildings, airports and strategic installations such as provincial legislatures and the Union Buildings that are considered worthy of tight security so as to prevent ...

Read more...
Keeping security on track
October 2006, Asset Management
The theft situation within Spoornet is very volatile and is driven by various factors such as the geographic dispersion of Spoornet (35 000 km of rail network) socio-economic factors and lack of police resources

Read more...
High speed noise suppression
27 July 2005, Circuit & System Protection, Infrastructure
Picked up from internal clocks by transmission lines, and radiated by USB cables acting as transmitting antennas, the problems of radiated and conducted noise are well known. These problems are compounded ...

Read more...



<< First   < Previous   Page 5 of 6   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.