Integrated Solutions



The question of maintenance
October 2013, neaMetrics, Financial (Industry)
The costs of maintenance, support and repairs over the lifespan of the technology play a major role in the overall cost, sometimes even costing more than the initial purchase price.

Read more...
Logistically secure and operationally efficient
October 2013, Surveillance
In many supply chain companies the same surveillance system which supports security services could be doubly useful, and even more valuable, as a tool for process documentation and process optimisation. It just needs to be integrated with the right data sources.

Read more...
Top 10 cloud surveillance challenges
October 2013, Surveillance
This paper is designed to distil what is typically a few weeks of meetings with customers about their cloud video surveillance needs into a few high-level challenges. Here are 10 key challenges and a few thoughts on solutions.

Read more...
Built-in IR illumination in Axis’ cameras
October 2013, Axis Communications SA, Surveillance
IR illumination includes new, long-life LED technology that is power-efficient and minimises heat dissipation. This results in high-quality, low-noise video even when the environment is completely dark.

Read more...
Physical security gets a boost from logical alliance
October 2013, Bidvest Protea Coin, News & Events
Bidvest Magnum, Dimension Data and EMC Southern Africa have formed an alliance to provide South African organisations with solutions that enable them to streamline management of their physical security environments and to better leverage data for their physical security and surveillance business needs.

Read more...
Pursuing paperless efficiency
October 2013, Financial (Industry)
Within an increasingly digitised world, what becomes of the paper-driven systems with which we are all familiar – and which still form an integral part of many business processes?

Read more...
Bank security technology
October 2013, Centurion Systems, Financial (Industry)
Not only do biometric access control systems offer identification through unique physical characteristics (mostly fingerprints), but they also provide a means of logging transactions and capturing users activities, further enhancing the institution’s site monitoring capabilities.

Read more...
Maintenance in rands and cents
October 2013, Johnson Controls - (Tyco Security Products), Financial (Industry)
The cost of maintaining security equipment can be substantial. That’s why the key to the successful implementation of security equipment is to consider the maintenance thereof in the procurement phase.

Read more...
Incorporating security into design
October 2013, Financial (Industry)
Security within facilities – CCTV, access control, alarms, fire detection and suppression, etc - is today increasingly integrated and digital, yet it is often an afterthought when a new building is designed.

Read more...
Modular design eases maintenance
October 2013, Centurion Systems, Financial (Industry)
This design philosophy is also evident in Centurion’s Claws roadway spikes and Trapex barrier fences, both of which are constructed in a modular fashion (which also makes them easy to transport and tailor to individual site requirements).

Read more...
IP standardisation proving its value
September 2013, Surveillance
Few would argue that as the industry continues its progression to widespread deployment of IP security technology, some type of standards are necessary to guide the industry in a unified direction. Over ...

Read more...
First transmission solution app launched
September 2013, Infrastructure, Products & Solutions
The ComNet Fibre Optic & Ethernet Products app is a solution identifier that allows you to choose the right transmission product for virtually every application.

Read more...
Introducing return on security ­investment (ROSI)
August 2013
An easier way to justify the value of security investments. How to prove your security management solution contributes to overall business success.

Read more...
Retail growth boosts technology adoption
August 2013, Johnson Controls - (Tyco Security Products), Retail (Industry)
Partnering with distribution house Miro, Granite Security has installed seven Vivotek IP Dome cameras, with an additional 29 still to be fitted, linking the feeds from these to 24x7 monitoring in its central control room.

Read more...
Securing the healthcare environment
August 2013, Healthcare (Industry)
The modern healthcare facility must contend with a difficult combination of increasing crime, tightening regulations, and economic challenges as administrators and their security teams strive to protect ...

Read more...
Cloud backups for business
August 2013
Fujitsu now offers business customers of all sizes a fail-proof, global cloud-based backup and recovery service, with the immediate availability of Fujitsu Backup as a Service (BaaS).

Read more...
Benefits of integrated backup
August 2013, DCC Techhnologies
Purpose-built backup appliances (PBBAs) – highly tuned, turnkey backup solutions that have preconfigured hardware, interconnects, interfaces, and software – are gaining popularity as the persistent growth of data continues to put pressure on protection and recovery processes.

Read more...
Integrated security at new JD premises
August 2013, Surveillance, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection
Jasco Security has recently completed the installation and implementation of an integrated video surveillance and security solution for JD Consumer Finance, a division of the JD Group, as part of the construction of its new premises in Randburg, Johannesburg.

Read more...
Using security technology to ­improve the bottom line
July 2013, Technews Publishing
Hi-Tech Security Solutions asked four vendors to share their customer experiences and explain how security technology can be used for non-security purposes.

Read more...
Cisco can teach the old school a trick or two
July 2013, Technews Publishing, Surveillance
Cisco has long had a physical security offering, but in its latest incarnation, it takes a step ahead of many of the traditional security vendors.

Read more...



<< First   < Previous   Page 50 of 81   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.