Editor's Choice



Ransomware defined 2017
November 2017, Information Security
Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased, while just two strains of ransomware were responsible for 89.5% of all attacks in 2017.

Read more...
People on the move
Access & Identity Management Handbook 2018, Access Control & Identity Management, Integrated Solutions, Infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.

Read more...
Access and identity: looking ahead
Access & Identity Management Handbook 2018, neaMetrics, ZKTeco, Access Control & Identity Management, Integrated Solutions
Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.

Read more...
Trusting your privilege
Access & Identity Management Handbook 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.

Read more...
The access edge
Access & Identity Management Handbook 2018, Johnson Controls, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.

Read more...
Facing the future
Access & Identity Management Handbook 2018, neaMetrics, Access Control & Identity Management, Infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?

Read more...
Securing your access security
Access & Identity Management Handbook 2018, G4S Secure Solutions SA, Impro Technologies, Access Control & Identity Management, Information Security
While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.

Read more...
Ding dong, it’s IP
Access & Identity Management Handbook 2018, Elvey Security Technologies , TOA Electronics, Dahua Technology South Africa, Black Point Tech cc t/a BPT, Access Control & Identity Management
IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.

Read more...
Access a mobile-first world
Access & Identity Management Handbook 2018, Axis Communications SA, Access Control & Identity Management, Infrastructure
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.

Read more...
Measurable policies and multi-layered approach hit the mother lode
October 2017, Integrated Solutions, Mining (Industry)
Securing mines is often a logistical nightmare as threats from common thieves to illegal miners are added to the inherent safety and security risks synonymous with mine complexes.

Read more...
What’s in a platform?
October 2017, Milestone Systems, Genetec, Surveillance, Integrated Solutions
Hi-Tech Security Solutions looks at what today’s security management platforms offer users from both small and large organisations.

Read more...
Trends in intruder detection
October 2017, Elvey Security Technologies , Secutel Technologies, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
Ease of use, integration and visual verification rule the roost in the modern intruder solution.

Read more...
Security professionals meet with the regulator
October 2017, Security Services & Risk Management, Associations
Dave Dodge, chairman of the South African Institute of Security (SAIS) and PSiRA CEO, Manabela Chauke sat down with other role players for an open discussion, the first of many.

Read more...
ESDA golf day delivers R35 000 to charity
October 2017, ESDA(Electronic Security Distributors Association), News & Events, Associations
The ESDA 2017 Charity Golf Day was held on 6 September 2017 at the Glendower Golf Course.

Read more...
Causes of fatigue
October 2017, Leaderware, Surveillance, Security Services & Risk Management
The security industry has many regulations, but in an industry where the type of work and other conditions lend themselves to fatigue, there is little on the handling of fatigue.

Read more...
Keeping pace with change
1 October 2017, Johnson Controls, Integrated Solutions
Hospitals need to secure not just their patients but their staff, their high value assets and sensitive areas like pharmacies. It requires an integrated approach.

Read more...
PDS for Sasol coal mines
October 2017, Perimeter Security, Alarms & Intruder Detection, Asset Management, Mining (Industry)
Monitech Mining Monitoring Systems was recently commissioned to supply and install a proximity detection system to a number of Sasol Mining’s underground operations.

Read more...
True system collaboration
October 2017, Surveillance, Integrated Solutions
Standalone security systems do not achieve organisational peace of mind, de-risk or optimise efficiencies, rather the value that they offer equates to no more than another begrudgingly checked compliance box.

Read more...
Visualising without seeing
October 2017, Hikvision South Africa, Surveillance, Integrated Solutions
One of the most exciting technologies in the security arsenal is thermal imaging, which essentially gives cameras the ability to monitor through darkness, fog, rain and other limited or zero visibility environments.

Read more...
Trends in commercial property
October 2017, Fire & Safety
The task of protecting people and property in emergency situations requires careful attention and appropriate investment.

Read more...



<< First   < Previous   Page 44 of 62   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.