Building sustainable smart cities June 2016, Integrated Solutions, Security Services & Risk Management Understand, plan and execute. When building sustainable cities, it is vital to first understand the difference between a smart city and a sustainable city.
Seeing through the fog June 2016, Graphic Image Technologies, CCTV, Surveillance & Remote Monitoring Thermal imaging cameras operate by detecting the heat signatures generated by people and objects and using this to generate a picture of the environment.
A commonsense guide to protecting electrical substations May 2015, CCTV, Surveillance & Remote Monitoring With electricity being top-of-mind for South Africa, perhaps we can learn from US efforts to create a standard for securing utilities. John Romanowich, president and CEO of SightLogix offers insight into the issue.
Data security is essential for Government May 2015, Galix Networking, Cyber Security Cybercrime is a burgeoning threat, not only to business but also to governments all over the world. The increasing number of highly publicised examples of cybercrime highlights this trend.
No quick fix for government security May 2015, IDEMIA , Integrated Solutions While there are a number of commonalities between securing a business facility and securing government and parastatal facilities, there are also a number of elements that require a slightly different approach.
Integrated border management May 2014 Gemalto launches integrated border and visa management solution for fast, reliable and secure immigration control. The solution integrates platforms, software and services to enhance security of border check points and significantly reduce waiting times through automated document verification and border control systems.
Integrated security features strongly in parastatals May 2014, Technews Publishing Just as private organisations depend on security systems to monitor activities in and around their premises and to control the access of people into their facilities, parastatals have similar needs. Hi-Tech Security Solutions spoke to Telkom and CSIR about the changing face of security in their domain.
Guidelines for key control in correctional facilities May 2014 At correctional facilities, the environment is highly structured to ensure that security, safety and order can be maintained. Security procedures are clearly defined and include among others, head counts, inmate movement tracking, visitor logs and cell inspections.
Local manufacturing by the numbers May 2013, News Hedley Davidson unpacks the realities of local manufacturing by the numbers, having been locally designing and manufacturing electronic access control since 1989. This article focuses on his belief that South African companies have the necessary ingredients to bring internationally competitive products to market.
Effective integrated security solutions March 2013, Chase Solutions, Integrated Solutions Government organisations need assistance in managing their varied disciplines through the use of technology, software solutions, measurable management of service providers and staff, and proper beneficial integration of the three pillars, namely 'people, process and technology'.
Dallmeier records petroleum security March 2013, CCTV, Surveillance & Remote Monitoring For many years the TPAO, Turkish Petroleum Corporation, has used recording devices by Dallmeier. When the system was expanded, a decision was made once again in favour of recording servers by the German CCTV IP specialists.
Securing complex sites since 1929 March 2013, Elvey Security Technologies , Access Control & Identity Management Government institutions are notoriously difficult to secure. They require a specialised system that will ensure the safety and security of employees and the back office while accommodating a constant flow of visitors in and out of the premises without hindering public access or infringing on people’s privacy.
High security access at nuclear site October 2012, Gallagher, Access Control & Identity Management Security is layered throughout the organisation and is structured around various security grades of facilities. The Gallagher security integration platform (formerly Cardax FT) is the backbone of electronic access control and intruder alarms at ANSTO.
Security and safety in Indonesia August 2012, Bosch Building Technologies, Integrated Solutions The company PT Pelabuhan Indonesia specialises in handling containers for international and domestic transportation in many ports in Indonesia. Due to harsh seaside conditions amidst facilities like container cranes and hypermodern cranes, they require top-class security equipment to ensure safety of employees.
Thinking out of the booklet May 2012, Access Control & Identity Management In every country, including South Africa, border security is thus coordinated among dozens of top-dog agencies from the military, police, intelligence, home office, foreign office, immigration, customs, health, exchange regulators, drug enforcement and anti-terrorist squads.
Crime-fighting surveillance May 2012, Bosch Building Technologies, CCTV, Surveillance & Remote Monitoring It has not been easy in the New York area, where there has been a consistently high volume of criminal activities around the perimeters of developments and in elevator cabs operated by New York City Municipalities.
Olsztyn courthouse May 2012, UTC Fire & Security SSA, Perimeter Security, Alarms & Intruder Detection, CCTV, Surveillance & Remote Monitoring The advanced access control system secures over 40 doors and is based on ATS1250 controllers, offering exclusive access to card holders. In order to build the CCTV solution, over 90 cameras were connected to eight high-capacity recorders.
Nigerian debt management office secured November 2011, Tyco Security Products, Access Control & Identity Management CEM S610f fingerprint card readers and advanced Power over Ethernet solution used to secure offices.
CEM Systems, a brand of Tyco Security Products, today announced that the CEM AC2000 Lite security ...