Best of the rest ...

October 2005 Access Control & Identity Management

ASSA ABLOY

ASSA ABLOY (SA) is Southern Africa's largest supplier of quality locking systems and associated products. The company has two large manufacturing units in southern Africa and boasts six agencies and branches situated in Durban, Cape Town, Port Elizabeth, Pretoria, Free State and Namibia. Other manufacturing and distribution sites have been established in Kenya, Tanzania and Zimbabwe.

Whilst ASSA ABLOY is renowned for its traditional lines such as pin tumbler locks, lever locks, domestic locks, OEM products, architectural ironmongery and gearlocks, which it has supplied to the market for over a century, the company is also leading the trend towards higher security products which now include electric locks and electronic keys with audit trail capabilities, in-room safes, magnetic locks, mechanical locks, access control, revolving, sliding and stacking door systems, window latches, aluminium products and emergency escape hardware. More recently, ASSA ABLOY launched its EIS Division which offers keypad, card, biocard and asset tracking access readers which allow clients to track assets such as laptops, products, people and livestock. The keyless entry lockset is also an exciting product that works off remote control. Other products on offer are fingerprint locks and biometric locks. Its brands include Besam, Chubb Locks, Esco, effeff, Elsafe, HID, Inhova, MAB, Mul-T-Lock, Tesa, Timelox, Trimec, UNION, VingCard and YALE.

Bewator

The Bewator Group develops and markets products and systems within access and video control security. According to leading market analysts, Frost & Sullivan, Bewator is ranked as one of the top three European access control suppliers. With some 330 employees with the group headquarters located in Solna, Sweden and subsidiaries in Sweden, Norway, Denmark, Finland, Germany, the UK, Belgium, and the Netherlands. Bewator has an international network of more than 10 000 security installers who actively support the product range in more than 45 countries. Bewator International is a division of the Bewator Group with dedicated responsibility for sales and support of all access control products and security management systems in all international territories. Products include Bewator 2010, Granta Systems, Cotag technology cards and readers, Bewator access control products, door entry systems and CCTV products.

GE Infrastructure Security

GE Infrastructure Security is a global technology leader dedicated to supporting the needs of the Security rapidly growing electronic security industry. In South Africa, GE Security South Africa security business has expertise in all areas of electronic security, including intrusion and fire protection (Aritech, Caddx, ITI, Sentrol, Tecom, Cosmotron, ESL), electronic access and facility management (Aritech, Casi-Rusco, Origin Data Systems, Tecom), key management and remote access systems and services (Supra), fibre optic transmission and reception equipment (Fiber Options), CCTV, digital video, and surveillance equipment (Aritech, GBC-USA, GBC-Europe, Kalatel) and video multiplexing and digital storage (Aritech, Kalatel) among others.

Kaba

With some 5900 employees the Kaba Group is one of the world's leading players in the security industry. Its access control product portfolio, Kaba's largest business segment by sales, includes mechanical and mechatronic locks and cylinders, masterkey systems, and the control software of integrated access systems for general commercial applications. It also contains market-specific products such as pushbutton locks, which are popular in the USA and in Asia-Pacific. Kaba's electronic PowerLever locks have gained global fame; they require neither batteries nor wiring to a power source. The ability to combine masterkey systems with access control has resulted in interesting innovations that have created a significant competitive edge for Kaba. With its 'Total Access' strategy, the Kaba Group is specialised in integrated solutions for security, organisation and convenience at building and information access points.

Middleware Associates

Middleware Associates launched its first facility access control and security software solution, built on 100% Open Source Architecture, at the recent ASIS 2005 Annual Seminar and Exhibit in Orlando, Florida. Proviso-IP is the next generation access control system designed for enterprise interoperability, scalability and a completely open systems architecture that allows corporations and institutions to easily customise the system to meet their security and IT policies and procedures. Middleware Associates is positioning Proviso-IP as an extremely cost effective system based on its free source licence and native IP devices that eliminate significant wiring, additional controller hardware and maintenance costs. Because of its open systems design, Proviso-IP meets the requirements of the Open Security Infrastructure, an initiative that promotes non-proprietary security systems design and enterprise interoperability. Is this a pointer towards the future of integrated security solutions?

S2 Security Corporation

In another indication of the influence that IT is having on the development of and architecture underpinning modern security managements solutions, a new entrant into the market, S2 Security Corporation, has introduced a unique line of network-ready products for the physical security industry that integrate access control, alarm monitoring, video and temperature monitoring. Its flagship product, the S2 NetBox, is a network appliance that implements a complete, integrated, solid state security management system that can be operated securely from a Web browser over a LAN, WAN, or via the Internet. S2 began operation in March 2003 formed by a team of seven founders led by John L. Moss, former CEO and founder of Software House (currently a unit of Tyco Fire and Security). The S2 NetBox is the first physical security management system to integrate access control, alarm monitoring, video, intercom and temperature monitoring applications in a small-form factor network appliance. It utilises a new system architecture that moves advanced physical security capabilities to the network edge, eliminating the need for a separate PC-based server. This architecture makes it possible to deploy systems that scale from single facilities to multisite organisations - all over an IP network. Has the future arrived?





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.