Technews Publishing
Keeping cash safe
May 2013, Security Services & Risk Management, Retail (Industry)
Biometrics, interlocks, cash degradation systems, time delay lockers and safes, remote opening, better physical armouring protection, tracking, CCTV, automatic number plate recognition (ANPR), DNA sprinklers and smoke cloaks are all technologies that have played a large role in the reduction in cash-in-transit incidents.
Read more...
Local is lekker the world over
May 2013, News & Events
Despite facing many problems, South African manufacturers of security products manage to produce goods that are not only successfully deployed in the country, but also throughout Africa and the developed world. Hi-Tech Security Solutions spoke to four successful local manufacturers.
Read more...
If you build a BMS, will they install?
May 2013, Integrated Solutions
After many years and unhappy customers, most BMS systems today are open and support a variety of communications protocols. With this in hand, we should expect to see more vendors extending their BMS systems into the cloud.
Read more...
Surveillance culture, good and bad
May 2013, News & Events
News of the bomb attack in Boston was all over the news last month, complete with some really mindless and careless speculation among TV and print journalists about who did it, who was arrested and ...
Read more...
Securing large commercial facilities
April 2013, Integrated Solutions
How do large commercial facilities secure their premises without hindering the passage of legitimate visitors and employees? What role do the technological and human elements play in the equation?
Read more...
Visitor management central to security
April 2013, Access Control & Identity Management
At the end of the day, while visitor management is often seen as a separate component of the security process, it cannot be if the company concerned is to have comprehensive control over its environment. It is, first and foremost, an element of access control and identity management that controls the access and permissions of staff, strangers or infrequent visitors to a site.
Read more...
Preparation, expectation and authentication is key
April 2013, Information Security
How exposed are South African companies to cyber attacks? Are they an easy target or simply ignorant? Are they doing enough to protect themselves? How serious is this threat to your average company in South Africa and Africa, or is the threat confined to certain types of companies?
Read more...
Has anything changed?
April 2013, Perimeter Security, Alarms & Intruder Detection
Intruder detection and alarm monitoring goes back many years. So has anything changed? Are we seeing technologies such as surveillance and video verification, coming to the fore or is this reserved for ...
Read more...
Staying in control
April 2013, Surveillance
The number of security control rooms has increased over the past few years as organisations see the benefits of monitoring the movement of people and even processes. The big question though is whether ...
Read more...
A conversation about security
April 2013, Information Security
The person who is probably most in touch with the state of information security in South Africa is Craig Rosewarne, MD of Wolfpack Information Risk and founder and chairperson of the Information Security ...
Read more...
Investing in Africa? Is there a choice?
April 2013, News & Events
It is strange to hear the different opinions people have on the security industry. The most common one I hear is that business must be booming if you have anything to do with security in South Africa ...
Read more...