Hi-Tech Security Solutions Magazine


Featured articles


The security of biometrics
Hi-Tech Security Solutions asks whether your personal biometric data is safe from prying eyes.

Read more...

Access control is paramount for cloud security
There is a misperception that if the cloud is secure, measures to control access to data are not necessary as the data is in a ‘safe place’.

Read more...

Steps to successful biometric implementation
Biometrics can provide the organisation with an intelligent balance of security and convenience if implemented and managed correctly.

Read more...



IoT and behavioural authentication
CA Southern Africa, Access Control & Identity Management

IoT represents an increasing security risk to individuals in the form of pervasive, always-on monitoring of your personal activity with a potential compromise of your most personal security credentials.
read more


Cards are a growth market
Access Control & Identity Management

Cards for access control and identity management are still the main player in the commercial world, with service providers and technology making it easier to manage and even print your own cards.
read more


Biometrics Selection Guide 2020
Biometrics Selection Guide


read more


The frictionless future of facial recognition
NEC XON, Access Control & Identity Management

The new way for travellers to get from gate to destination by using their face.
read more


Access Selection Guide 2020
Access Selection Guide


read more


Mobile access control for Sea Rescue
Salto Systems Africa, Access Control & Identity Management

To simplify and speed up access control, Sea Rescue installed mobile access control technology from SALTO at its V&A Waterfront station in Cape Town.
read more


Directory of access and identity management suppliers 2020
Access Control & Identity Management


read more


Managing the insider threat
CA Southern Africa, Access Control & Identity Management

Gerard King discusses best practices for the management of privileged users in the mainframe environment in a world where the insider threat is always growing.
read more


Access control security at In2Foods
Turnstar Systems, Access Control & Identity Management

It is extremely important, with the pervasive threat of crime, for organisations to protect their perimeters and entry and exit points.
read more


Wireless access for visibility and security
Salto Systems Africa, Access Control & Identity Management, Education (Industry)

The Deutsche Internationale Schule Johannesburg has gained full visibility and improved security through the installation of locking technology from SALTO.
read more


Simple steps to protect yourself against identity theft
Access Control & Identity Management

Are you doing enough to reduce the risk of having your identity stolen?
read more


Minding the gaps to protect industrial PLCs from cyber threats
AVeS Cyber Security, Cyber Security

PLCs, designed to control machinery and specific processes, were never built with cybersecurity threats in mind and protecting PLCs against these threats requires healthy isolation from the Internet.
read more


Live vehicle monitoring in estates
Products

The eTrac from BetaTrac allows estates to not only register vehicles as they enter the estate, but track their movements while there.
read more


Stolen credentials on the Dark Web
Cyber Security, Security Services & Risk Management

Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.
read more


Stolen credentials on the Dark Web
Cyber Security, Security Services & Risk Management

Over 21 million credentials belonging to Fortune 500 companies, 16 million of which were compromised during the last 12 months, are up for sale.
read more


Accelerating global IoT deployment
IT infrastructure

Upcoming suite of Eseye products will deliver global IoT connectivity with near 100% coverage, automated onboarding and data provision into AWS IoT Core.
read more


The importance of XDR for cyber protection
Cyber Security, Products

35% of South African organisations are expecting an imminent cyberattack and a further 31% are bracing for it to happen within a year, according to local research conducted by Trend Micro.
read more


Enterprise security must change
Cyber Security, Security Services & Risk Management

The recent wave of cyberattacks against local banks has highlighted the importance of protecting data against malicious users.
read more


2020 Residential Estate Security Conference in KZN
Technews Publishing, News, Residential Estate (Industry)

Meeting the residential security challenges in 2020 and beyond: Hi-Tech Security Solutions will host the Residential Estate Security Conference 2020 in Durban on 12 March 2020.
read more


Digitising Maslow’s Hierarchy of Needs
Integrated Solutions, IT infrastructure

Mobile technology has the potential to change how Africa approaches patient and healthcare, says Phathizwe Malinga, managing director, SqwidNet.
read more


Integrated security solution
Elvey Security Technologies , Access Control & Identity Management

The ability of access control solutions to seamlessly work with surveillance and building management systems is so important it cannot be overemphasised.
read more


Waving goodbye to residents’ access cards
IDEMIA , Access Control & Identity Management

Midlands Estate sought to remedy the security risks posed by access cards by enrolling the fingerprints of all its residents, but this proved more challenging than expected.
read more


From physical security to cybersecurity
Genetec, Cyber Security, Security Services & Risk Management

Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.
read more


A picture spoofs a thousand cameras
NEC XON, Hikvision South Africa, Technews Publishing, Access Control & Identity Management

Hi-Tech Security Solutions looks into the reliability and effectiveness of facial biometrics as well as the concerns about privacy.
read more


Creating smarter government IDs
HID Global, Access Control & Identity Management

The adoption of biometric identification solutions in the creation of smarter government IDs is a process requiring various steps which should enhance the experience of all users.
read more


Looking ahead with mobile access technologies
Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher, Access Control & Identity Management, Integrated Solutions

Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...
read more


New online training gives installers more options
Paxton Access, Training & Education

Paxton has launched an online training tool, easily accessible via its new website, offering installers more options and opportunities to enhance their skills anytime, anywhere.
read more


People mobility management
Secutel Technologies, Access Control & Identity Management

Defining, controlling and monitoring entries and exits at each site, zone, floor, area and location is of utmost importance.
read more


Process control lockout in the petrochemical industry
Access Control & Identity Management

Procedures for managing access to, and the maintenance of, pipelines involve processes that control and securely lock out sections. These procedures need to be enforced and rigorously policed.
read more


Visitor management for estates
Powell Tronics, Residential Estate (Industry), Access Control & Identity Management

Residential estates and business parks around South Africa have installed access control systems that aim to streamline access for both pedestrians and vehicular traffic.
read more


A smarter way to manage access
Genetec, Access Control & Identity Management

ClearID is Genetec’s unified physical identity and access management solution designed for better control of organisational access control policies.
read more


Biometrics in identity
Access Control & Identity Management, Security Services & Risk Management

With multiple identity providers offering to manage digital identities for the general public, the root identity – the single sovereign trusted identity upon which all others are based – must start with government.
read more


Reducing identity fraud with a selfie
Technews Publishing, Asset Management, EAS, RFID

Authenticating your identity remotely via an app has become a reality with a new solution from South African company iiDENTIFii.
read more


Mobile access is more secure than card systems
Access Control & Identity Management

The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new technology.
read more


This is the future. This is what we do.
ZKTeco, Access Control & Identity Management

ZKTeco has created a unique range of visible light facial recognition products combined with a flexible Android platform.
read more