The authoritative resource for physical and converged security
Home
About us
Back issues / E-book / PDF
Subscribe
Advertise
Handbooks ▼
Access & Identity Management
CCTV
Residential Security
Handbooks
▸ Access & Identity Management
▸ CCTV
▸ Residential Estate Security
Categories
▸ Editor's Choice
▸ Tech Jobs Network
▸ Career opportunities
▸ Advertise for staff
▸ News
▸ Access Control & Identity Management
▸ Asset Management, EAS, RFID
▸ Associations
▸ CCTV, Surveillance & Remote Monitoring
▸ Conferences & Events
▸ Cyber Security
▸ Fire & Safety
▸ Integrated Solutions
▸ IT infrastructure
▸ Perimeter Security, Alarms & Intruder Detection
▸ Products
▸ Security Services & Risk Management
▸ Smart Home Automation
▸ Training & Education
▸ Videos
▸ Security by Industry Sector
▸ Agriculture
▸ Commercial
▸ Education
▸ Entertainment and Hospitality
▸ Financial
▸ Government and Parastatal
▸ Healthcare
▸ Industrial
▸ Logistics
▸ Mining
▸ Residential Estate
▸ Retail
▸ Transport
×
Categories
Editor's Choice
Tech Jobs Network
▸
Career opportunities
▸
Advertise for staff
News
Access Control & Identity Management
Asset Management, EAS, RFID
Associations
CCTV, Surveillance & Remote Monitoring
Conferences & Events
Cyber Security
Fire & Safety
Integrated Solutions
IT infrastructure
Perimeter Security, Alarms & Intruder Detection
Products
Security Services & Risk Management
Smart Home Automation
Training & Education
Videos
Security by Industry Sector ▾
▸
Agriculture
▸
Commercial
▸
Education
▸
Entertainment and Hospitality
▸
Financial
▸
Government and Parastatal
▸
Healthcare
▸
Industrial
▸
Logistics
▸
Mining
▸
Residential Estate
▸
Retail
▸
Transport
PDF
e-Book
Issue 4 2022
Find companies, products and services (HSBD)
Featured articles
All-mobile people management solution with facial recognition
Are you your insider threat?
Different application scenarios for thermal cameras
FFETA Charity Golf Day raises R100 000 for Children of Fire
Free and open-source tool for detecting stalkerware
Look before you leap into a back-up power solution
Maintaining security and CCTV functions in difficult economic times
Next-level manufacturing with smart cameras
Passion, drive and hard work
R60 per month per camera for cloud AI
Securex back with a bang
South Africa adopts ISO standard to guide use of social media in emergencies
From the Editor's Desk
From the editor's desk: A way to fail safely
News
Add a mobile punch to payroll
ADI Expo returns to Joburg and Durban
Axis sets science-based targets for reducing emissions
Cathexis releases Carbon, a new user-friendly GUI
CathexisVision integrated with Suprema’s BioStar2
Cybereason expands presence across sub-Saharan Africa
Cybersecure surveillance cameras
Duxbury awarded Axis SA Distributor of the Year
Gallagher releases Command Centre v8.70
How deepfakes attack business and how to combat them
inq. acquires Enea Edge IP for edge orchestration capability
Liquid launches Africa's first Cyber Security Fusion Centre
StorONE eliminates capacity-based pricing, offers per-drive pricing model
Trackforce Valiant acquires TrackTik Software
Access Control & Identity Management
ACaaS: The future of access control systems
Advantages of palm vein biometrics
Hospitality in the post-pandemic world
Local innovation continues
Local makes lekker parking bay management technology
Maximise parking lot security
Powder coating provides durable finish
Asset Management, EAS, RFID
Global GPS tracking and IoT management platform
CCTV, Surveillance & Remote Monitoring
AI in surveillance
Branches and roots
Custom AI video analytics with AxxonSoft
Eagle Eye introduces ‘Smart Video Search’
IDIS releases latest-generation 6 MP and 8 MP PTZ cameras
Secutel expands into Africa and the UAE
Cyber Security
Be prepared for the increase in reconnaissance
Cybercriminals eye South African SMEs lack of security
Harnessing the power of AI-driven XDR
How to weather the approaching perfect storm
Poor router security makes SMBs vulnerable to attack
The new front line for cyberattacks
Why SBOMs are mission critical
Industrial
Cyber resilience is more than security
Identity management in a factory environment
Optimised people, processes and technology
Preventing cyberattacks on critical infrastructure
Security and safety in food manufacturing
IT infrastructure
Becoming more cyber resilient
Don’t let endpoint security be an afterthought
Storage-as-a-service, optimised with AIOps
The importance of device and connectivity management
Perimeter Security, Alarms & Intruder Detection
Ajax solves security communication range issues
Flexible perimeter solutions
Keeping an eye on the perimeter
Network strobe siren
Saving with legacy alarm integration
The house wins with Ajax
Products
Controlled access on BRT system bridge
Linux-based biometric access control
Next generation boom gate
What to consider when choosing a power backup plan
Security Services & Risk Management
Minimise the cost and impact of protest activity
Obscure Technologies adds OneTrust to portfolio
Three ways to prevent non-delivery
Published by Technews
»
Dataweek Electronics & Communications Technology
»
Electronics Buyers' Guide (EBG)
»
Hi-Tech Security Solutions
»
Hi-Tech Security Business Directory
»
Motion Control in Southern Africa
»
Motion Control Buyers' Guide (MCBG)
»
South African Instrumentation & Control
»
South African Instrumentation & Control Buyers' Guide (IBG)
©
Technews Publishing (Pty) Ltd
| All Rights Reserved