Editor's Choice



Disaster recovery as a service?
November 2017, Security Services & Risk Management
Johan Scheepers looks at the implications of the emergence as well as the benefits of disaster recovery as a service (DRaaS).

Read more...
Availability in the age of security risk
November 2017, Security Services & Risk Management
Enterprises are spending millions on disaster recovery (DR) and business continuity (BC) strategies but they do not invoke them nearly enough for the investment to be measured.

Read more...
Documentation for fire systems
November 2017, FDIA (Fire Detection Industry Association), Fire & Safety
A fire detection system is not considered complete until there is adequate and necessary documentation about the system.

Read more...
South Africa is a target for cyber attacks
November 2017, Information Security, Security Services & Risk Management
South Africa is currently a magnet for cyberattacks, with hackers set on stealing data.

Read more...
Ransomware defined 2017
November 2017, Information Security
Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased, while just two strains of ransomware were responsible for 89.5% of all attacks in 2017.

Read more...
People on the move
Access & Identity Management Handbook 2018, Access Control & Identity Management, Integrated Solutions, Infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.

Read more...
Access and identity: looking ahead
Access & Identity Management Handbook 2018, neaMetrics, ZKTeco, Access Control & Identity Management, Integrated Solutions
Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.

Read more...
Trusting your privilege
Access & Identity Management Handbook 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.

Read more...
The access edge
Access & Identity Management Handbook 2018, Johnson Controls, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.

Read more...
Facing the future
Access & Identity Management Handbook 2018, neaMetrics, Access Control & Identity Management, Infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?

Read more...
Securing your access security
Access & Identity Management Handbook 2018, G4S Secure Solutions SA, Impro Technologies, Access Control & Identity Management, Information Security
While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.

Read more...
Ding dong, it’s IP
Access & Identity Management Handbook 2018, Elvey Security Technologies , TOA Electronics, Dahua Technology South Africa, Black Point Tech cc t/a BPT, Access Control & Identity Management
IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.

Read more...
Access a mobile-first world
Access & Identity Management Handbook 2018, Axis Communications SA, Access Control & Identity Management, Infrastructure
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.

Read more...
Measurable policies and multi-layered approach hit the mother lode
October 2017, Integrated Solutions, Mining (Industry)
Securing mines is often a logistical nightmare as threats from common thieves to illegal miners are added to the inherent safety and security risks synonymous with mine complexes.

Read more...
What’s in a platform?
October 2017, Milestone Systems, Genetec, Surveillance, Integrated Solutions
Hi-Tech Security Solutions looks at what today’s security management platforms offer users from both small and large organisations.

Read more...
Trends in intruder detection
October 2017, Elvey Security Technologies , Secutel Technologies, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
Ease of use, integration and visual verification rule the roost in the modern intruder solution.

Read more...
Security professionals meet with the regulator
October 2017, Security Services & Risk Management, Associations
Dave Dodge, chairman of the South African Institute of Security (SAIS) and PSiRA CEO, Manabela Chauke sat down with other role players for an open discussion, the first of many.

Read more...
ESDA golf day delivers R35 000 to charity
October 2017, ESDA(Electronic Security Distributors Association), News & Events, Associations
The ESDA 2017 Charity Golf Day was held on 6 September 2017 at the Glendower Golf Course.

Read more...
Causes of fatigue
October 2017, Leaderware, Surveillance, Security Services & Risk Management
The security industry has many regulations, but in an industry where the type of work and other conditions lend themselves to fatigue, there is little on the handling of fatigue.

Read more...
Keeping pace with change
1 October 2017, Johnson Controls, Integrated Solutions
Hospitals need to secure not just their patients but their staff, their high value assets and sensitive areas like pharmacies. It requires an integrated approach.

Read more...



<< First   < Previous   Page 44 of 62   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.