The authoritative resource for physical and converged security
Home
About us
Back issues / E-book / PDF
Subscribe
Advertise
Handbooks ▼
Access & Identity Management
CCTV
Residential Security
Handbooks
▸ Access & Identity Management
▸ CCTV
▸ Residential Estate Security
Categories
▸ Editor's Choice
▸ Tech Jobs Network
▸ Career opportunities
▸ Advertise for staff
▸ News
▸ Access Control & Identity Management
▸ Asset Management, EAS, RFID
▸ Associations
▸ CCTV, Surveillance & Remote Monitoring
▸ Conferences & Events
▸ Cyber Security
▸ Fire & Safety
▸ Integrated Solutions
▸ IT infrastructure
▸ Perimeter Security, Alarms & Intruder Detection
▸ Products
▸ Security Services & Risk Management
▸ Smart Home Automation
▸ Training & Education
▸ Videos
▸ Security by Industry Sector
▸ Agriculture
▸ Commercial
▸ Education
▸ Entertainment and Hospitality
▸ Financial
▸ Government and Parastatal
▸ Healthcare
▸ Industrial
▸ Logistics
▸ Mining
▸ Residential Estate
▸ Retail
▸ Transport
×
Categories
Editor's Choice
Tech Jobs Network
▸
Career opportunities
▸
Advertise for staff
News
Access Control & Identity Management
Asset Management, EAS, RFID
Associations
CCTV, Surveillance & Remote Monitoring
Conferences & Events
Cyber Security
Fire & Safety
Integrated Solutions
IT infrastructure
Perimeter Security, Alarms & Intruder Detection
Products
Security Services & Risk Management
Smart Home Automation
Training & Education
Videos
Security by Industry Sector ▾
▸
Agriculture
▸
Commercial
▸
Education
▸
Entertainment and Hospitality
▸
Financial
▸
Government and Parastatal
▸
Healthcare
▸
Industrial
▸
Logistics
▸
Mining
▸
Residential Estate
▸
Retail
▸
Transport
PDF
e-Book
Issue 5 2021
Find companies, products and services (HSBD)
Featured articles
Beyond IoT integration
Fence monitoring from the cloud
Managing a breach or ‘dirty’ network
Smart mining and cyber risks
Viewer’s bias
From the Editor's Desk
From the Editor's desk: Bitcoin or Ether?
News
Ajax Systems participates in SecurExpo East Africa for the first time
Bind Digital Certificates to their signing date and time
Do you really know who you’re hiring?
Do your part, be Cyber Smart
Eagle Eye Networks announces CPD-certified classes for resellers
Global relationship strengthened by local partnership
Secutel Technologies gets ISO 9001:2015 certification
The first step in addressing crime is to report crime
Access Control & Identity Management
Containerised access control solutions at Xxaro
Keeping unwanted vehicles at bay
New visitor management solution
Optimising cloud services
The ‘tricky-triad’ of access control
The business benefits of facial recognition systems
Agriculture
Reliable and robust radios
Security concepts for rural security
Asset Management, EAS, RFID
A shift in the industry
Make security inspections intelligent and manageable
Secustar X-ray machine
X-rays and artificial intelligence
CCTV, Surveillance & Remote Monitoring
Asset and people tracking
Catching speeders in estates
Dahua releases upgraded Full-color 2.0
Integrating ground and air services
Portfolio of integrated interfaces
Surveillance in mining security
Thermal and multi-sensor cameras in view
Time to rethink what you know about VMS
Conferences & Events
What IoT means for businesses in a cloud-driven world
Cyber Security
Can businesses really protect their customers?
Protecting your workforce
Editor's Choice
The role of cyber resilience in digital transformation
Industrial
How safe are our factories?
Integrated Solutions
Climate-smart mining on the road to Industry 4.0
IT infrastructure
Effective, resilient underground wireless communications
Five benefits of private 5G
NB-IoT to increase narrowband IoT adoption
SASE, the key network security component
Securing your network
Mining
Collaborative mine security methodologies
End-to-end communication and monitoring
How can South Africa’s mines embrace digital transformation?
Integrated solutions for mining
Integrating biometrics and operations
Kruger National Park upgrades communication system
Mines can create value with effective fire suppression
Products
Genata PoE switches
HeatPro thermal cameras
Security Services & Risk Management
Central control over sensitive data
Countering evolving threats with evolved technology
Disaster recovery during Covid-19 and beyond
Drone surveillance and response
Securing PoPIA data protection agreements
Published by Technews
»
Dataweek Electronics & Communications Technology
»
Electronics Buyers' Guide (EBG)
»
Hi-Tech Security Solutions
»
Hi-Tech Security Business Directory
»
Motion Control in Southern Africa
»
Motion Control Buyers' Guide (MCBG)
»
South African Instrumentation & Control
»
South African Instrumentation & Control Buyers' Guide (IBG)
©
Technews Publishing (Pty) Ltd
| All Rights Reserved