|
AcoustAlert
30 Burt Drive, Newton Park, Gqeberha
Core business offering: AcoustAlert is a cost-effective perimeter intrusion detection system (PIDS) that uses the microphonic effect of special sensor cables to listen to your fence and detect persons cutting, climbing or interfering with the fence. Detection zones can span up to 300 metres. AcoustAlert is made in South Africa.
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
AcoustAlert
(Manufacturer) |
Section - IoT/IT security infrastructure
-Other networking equipment
Section - Perimeter security
-Perimeter intrusion detection systems (PIDS)
Section - Service providers
-Risk assessments
-Technical focus
- Perimeter security, alarms & intruder detection
-Commercial
-Government & parastatal
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Transport
-Warehousing
-Perimeter security
- Intruder detection (exterior)
-Commercial
-Government & parastatal
-Industrial & manufacturing
-Logistics
-Mining
-Transport
-Warehousing
News from AcoustAlert: |
Perimeter protection in Ghana
October 2019, Perimeter Security, Alarms & Intruder Detection, Mining (Industry), AcoustAlert
A gold mine in Ghana has erected a dual fence with AcoustAlert PIDS fence detection on both inner and outer fence lines. |
Perimeter security in high EMF environments
October 2019, Perimeter Security, Alarms & Intruder Detection, AcoustAlert
Testing AcoustAlert PIDS on extra high tension sites like power stations and power generating gas turbine plants. |
Security news: |
Are we our own worst enemy?
April 2024, Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa. |
SA's cybersecurity risks to watch
April 2024, Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers. |
Protecting IP and secret data in the age of AI
April 2024, Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data. |
Cyberthreats facing SMBs
April 2024, Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.
|
What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it. |
Gallagher Security’s Integrate Roadshow
April 2024, News & Events, Gallagher
Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals. |
Eighty percent of fraud fighters expect to deploy GenAI by 2025
April 2024, Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality. |
visit www.securitysa.com |
|
|
|
|
|