Editor's Choice


Residential Estate Security Conference 2019: Integrating man and machine for effective security and operations
July 2019, Technews Publishing, News, Residential Estate (Industry), Conferences & Events
The Residential Estate Security Conference 2019 will delve into how estates and their service providers can better integrate man and machine for more effective security and operations.

Read more...
Ingo Mutinelli moves to IDEMIA
July 2019, Technews Publishing, IDEMIA , News
IDEMIA, the security and identity management company has announced that Ingo Mutinelli will be taking on the post of regional sales director for the southern Africa region.

Read more...
Milestone appoints new VP for research and development
July 2019, Milestone Systems, CCTV, Surveillance & Remote Monitoring, News
Milestone Systems has appointed Tom Bjerre as its new VP for research and development. He will oversee planning, development, testing and release of Milestone Systems’ video management software.

Read more...
Johnson Controls launches Technology Contracting in Africa
July 2019, Johnson Controls, News, Security Services & Risk Management
To address the growing challenge of planning, integrating and maintaining a multitude of different, highly connected systems, Johnson Controls is launching Technology Contracting in Africa.

Read more...
Social media and intelligence-led surveillance
July 2019, Leaderware, Integrated Solutions, Security Services & Risk Management
Social media has become a major feature of most people’s lives in the last few years and they can be invaluable as a source of information for companies and security organisations.

Read more...
NIST recommends ONVIF as new standard for FBI
July 2019, CCTV, Surveillance & Remote Monitoring, News
ONVIF’s Export File Format is the new standard recommended by the National Institute of Standards and Technology (NIST) for the exporting and playback of video surveillance recordings.

Read more...
SIA talks open APIs at ID4Africa
July 2019, Access Control & Identity Management, Integrated Solutions
Pioneering industry-first open standards initiative from the Secure Identity Alliance assures interoperability for sovereign ID programmes and promises to eliminate vendor lock-in.

Read more...
Data protection more challenging
July 2019, IT infrastructure
The number of businesses unable to recover data after an incident nearly doubled from 2016, according to the Global Data Protection Index surveying 2 200 IT decision makers from 18 countries.

Read more...
Small business solutions with ­Access in a Box
July 2019, Impro Technologies, Access Control & Identity Management, Products, Commercial (Industry)
Access in a Box is specifically designed for small businesses, or businesses with only a few entry points such as gyms, medical practices or retail stores.

Read more...
The 4th Industrial Revolution
July 2019, Wolfpack Information Risk, Cyber Security, Security Services & Risk Management, Industrial (Industry)
Most major industries have turned to and are reliant on technology to run their operations. This is a time of great promise, but also one of frightening peril.

Read more...
Cyber-attacks target operational technology
July 2019, Cyber Security, Industrial (Industry)
Focus on operational technology security increasing as around 74% of OT organisations come under attack in the past year, finds a new Fortinet report.

Read more...
A birds-eye view for Pran Boulevard
July 2019, Axis Communications SA, CCTV, Surveillance & Remote Monitoring, Commercial (Industry)
New development holds nothing back when developing surveillance systems to assist with preventative security in a modern office space.

Read more...
Axis 7th generation ARTPEC chip
June 2019, Axis Communications SA, CCTV, Surveillance & Remote Monitoring, Cyber Security
Axis has launched its 7th generation ARTPEC chip, optimised for network video, to improve all the signature Axis technologies created to address difficult light conditions.

Read more...
Access authentication with a wave
May 2019, IDEMIA , Access Control & Identity Management, Integrated Solutions, Financial (Industry), Commercial (Industry)
Financial organisations are making the move to contactless fingerprint biometrics in order to meet the increasing burden of regulatory and compliance demands.

Read more...
The benefits of background screening
May 2019, iFacts, Managed Integrity Evaluation, Security Services & Risk Management
Companies need to be more vigilant about the people they employ by making sure comprehensive background screening checks are conducted.

Read more...
Does your control room add value?
May 2019, Fidelity Security Group, G4S South Africa, Progroup , CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure, Commercial (Industry)
Whether on- or offsite, control rooms are a critical aspect of security today and care must be taken in the design and rollout of these nerve centres.

Read more...
iLegal 2019: Augmented surveillance - realising the full potential of CCTV
May 2019, Technews Publishing, News, Conferences & Events, Training & Education
iLegal 2019 will look at what is becoming known as Augmented Surveillance – using technologies and people interactively to maximise results from operators and control rooms in order to make intelligent security and business decisions.

Read more...
Enthralled, educated and entertained
May 2019, Securex South Africa , News
Securex South Africa 2019 gears up to educate the industry, with free access to five content streams.

Read more...
Simplifying fire detection system installations
May 2019, Elvey Security Technologies , Fire & Safety, Security Services & Risk Management
A fire detection system needs to be selected with extreme care, as is selecting an installer that not only understands the various technologies employed in fire detection, but that also has the necessary accreditations and certifications.

Read more...
The enemy within – insider ­security threats
May 2019, Wolfpack Information Risk, Cyber Security, Financial (Industry)
Insider threats in today’s financial world are insidious and destructive and your defence against insiders should start long before the person assumes his/her position.

Read more...



      Page 1 of 32   Next >   Last >>