Qui custodit vigilum?

October 2014 News & Events

It’s amazing to see how the security industry works. It seems so dull and boring (unless you happen to be a security officer, in which case you prefer dull and boring as it gets very dangerous otherwise). In this issue we have another winner of an article from Dr Craig Donald that touches on a pertinent point of who’s protecting the watchers. That’s where the heading to this column comes from in case you were wondering. Now Mrs Harris can rest easy knowing my years of school Latin achieved something, although I wouldn’t put any money on the accuracy of my translation.

A little later in the magazine we have no less than three articles focused on new solutions for the guarding market, changing the traditional approach we’re all used to (and somewhat cynical of) and making it into something more powerful, measurable and even safer for the guards. This is an evolution that has been a long time coming, especially the better use of data to gain intelligent insights. And some of these improvements are in favour of the customer, who can now see exactly what they are paying for.

And talking of data, big data is also becoming big business in the security industry as we note in another article in the same section. We will be delving into the big data concept more in the new year, it promises to be an interesting investigation.

Looking ahead, in future issues we will also be delving into a company that has developed its own security management platform, it’s a PSIM platform with more useful features, and look at how it is being rolled out in Gauteng, even in a safe city project. Arguably, this project is a world leader so stay tuned.

Accessing everything

You will also have noticed that the 2015 version of the Access & Identity Management Handbook was bundled along with this issue of Hi-Tech Security Solutions. The handbook is our annual roundup of what is happening in the world of access control and identity management, containing the latest trends, opinions and a bunch of case studies that show what local and international companies are doing in this field to streamline their businesses. It’s not all about opening and closing doors anymore; integration and custom development is the name of the game and our local enterprises really are taking the lead.

Unfortunately, while there is a lot of information in the handbook itself, there are also a few articles we couldn’t get in because of space, so please watch out for the Access & Identity Management Handbook e-zines we send out, there will be additional information in them as well as on securitysa.com (of course).

And most importantly of all, if you have any comments, criticisms and suggestions, please let me know at [email protected], we know there is always room for improvement and we’d love to know what you’re looking for in Hi-Tech Security Solutions.

Andrew Seldon

Editor



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
SA businesses embrace GenAI, but strategy and skills lag
News & Events AI & Data Analytics
South African enterprises are rapidly integrating Generative AI (GenAI) into their operations, but most are doing so without formal strategies, dedicated leadership, or the infrastructure required to maximise value and minimise risk.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.