Integrated Solutions



Your money or your life
October 2012, Bosch Building Technologies, Financial (Industry)
In addition to protecting money and property, security systems serve to ensure the safety of employees and customers and to avert dangers, such as hold-ups, break-ins, theft or fires.

Read more...
Driving security into operations
October 2012, Financial (Industry)
Banking sector security systems include a mixture of CCTV, alarm systems, access control, ATM protection, off site monitoring and physical security (guarding). These various systems are usually linked back to a central control room using a variety of different forms of communication.

Read more...
Integrated security where you need it
October 2012
Most organisations inevitably have a number of security systems in place to protect their investment in technology. The problem is that these systems have traditionally operated independently of one another across both wired and wireless connections.

Read more...
Building management as a service?
October 2012, Johnson Controls
Data analytics, benchmarking, knowledge sharing, collaboration and a host of new FM apps make FM in the cloud very attractive.

Read more...
Banking on security
1 October 2012, Johnson Controls, Financial (Industry)
A single, open, adaptable platform with the intelligence to automate and standardise security implementation and response across the broad, and at multiple levels of the organisation, could add immense value.

Read more...
EOH Intelligent Infrastructure delivers smarter mining solutions
Access & Identity Management Handbook 2013, Mining (Industry)
The mining industries requirement regarding workforce management has evolved from standalone systems to fully integrated turnkey solutions.

Read more...
T&A solution guide
Access & Identity Management Handbook 2013
The client was experiencing problems with access control as well as calculating the payment of both contract and fulltime staff.

Read more...
Workforce Management Solution Guide
Access & Identity Management Handbook 2013
EasyRoster is a workforce management system that helps to ensure efficient rostering of staff according to contract requirements and recording of attendance (as well as the exporting of attendance details to different payroll systems).

Read more...
Protect your business's most important assets
Access & Identity Management Handbook 2013
People flow is the next generation of access control technology, offering solutions that enable enterprises to organise the movement and flow of people throughout a premises, building or site.

Read more...
Workforce management efficiency
Access & Identity Management Handbook 2013, neaMetrics
Workforce management is not a new concept, but the tools available to do this effectively, most of the time, rely on planning and recording systems that are only as reliable and authentic as the staff providing the input.

Read more...
Integrated security defends the prosecution
Access & Identity Management Handbook 2013
UTC Fire & Security offers Botswana’s Department of Public Prosecution a fully integrated security solution delivering fire detection, access control, intrusion detection and video surveillance.

Read more...
Carrol Boyes reduces downtime with Trac-Tech system
Access & Identity Management Handbook 2013, Asset Management, Industrial (Industry)
Managing absenteeism and accurately calculating hours worked had become a pressing issue at the Carrol Boyes’ Cape Town and Paarden Eiland facilities. Trac-Tech stepped in to tackle the problem.

Read more...
Wireless IP security system
Access & Identity Management Handbook 2013, Access Control & Identity Management, Industrial (Industry)
Air Products needed a single partner to manage the roll out of security upgrades to 25 sites across eight countries in mainland Europe. All the sites are operating facilities with live process systems, significant large vehicle traffic and, often, thousands of cylinder movements.

Read more...
More than simple security
September 2012, Technews Publishing, Industrial (Industry)
Hi-Tech Security Solutions chatted to four industry players about the importance of security systems within the industrial and manufacturing sector. Issues under discussion included whether the current economic downturn had accelerated the use of security systems and what role these systems play in occupational health and safety (OHS) compliance.

Read more...
Defining integration
August 2012, Technews Publishing
These days everyone calls themselves a systems integrator, claiming to have all the skills and experience necessary to integrate all types of products and technologies into a solution that adds value to the client. The users out there tell a different story.

Read more...
IP integration watches the media
August 2012
Allied Publishing, the distribution house for newspapers such as The Citizen and The Star, wanted a professional surveillance system at their Booysens and Kramerville depots that focused on IT.

Read more...
Bidvest Magnum Technology: Intimate client knowledge = successful projects
August 2012, Bidvest Protea Coin
Bidvest Magnum Technology is a division within the Bidvest Magnum Group security cluster, together with BidTrack, ACTS, Bidvest Magnum and Bidvest Magnum Mining.

Read more...
Keeping assets safe
August 2012, Technews Publishing, Healthcare (Industry)
A phased rollout for a security improvement was approved and IDtek Solutions was contracted as the systems integrator for Phase I. Phase I entailed the supply and installation of 161 Avigilon high-definition megapixel cameras.

Read more...
Security should be standard
August 2012, Healthcare (Industry)
While minimum security standards in hospitals are legislated, the cost of failed security systems is devastating to reputation and morale as the hostage drama at the Westville Hospital in April this year and the stabbing of a nurse at the Sterkfontein Hospital in Krugersdrop in February highlighted.

Read more...
Does integration deliver value?
August 2012, Healthcare (Industry)
Hospitals, by their very nature, are large, open public spaces that don’t immediately conjure up images of a highly secure environment, however, an integrated approach to security is rapidly becoming the norm as more and more ‘digital hospitals’ are being introduced.

Read more...



<< First   < Previous   Page 53 of 81   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.