SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Leadership

Security companies in Kenya

30 companies found
Showing 1 to 30 of 30 security companies in Kenya
Refine search
Company namePrimary business area Primary coverage
Advanosys Security and Automation TechnologiesIntegrated securityUnited States of America (USA)
Asoni Communications Co., Ltd.Consulting servicesGlobal
C4Line Corporation. (C4Line Co.)IP networking productsGlobal
Diebold IncorporatedPhysical securityGlobal
Eashani LtdCCTVUnited Kingdom (UK)
Haphil Africa SecuritiesManned guardingKenya
Hepsi Security SystemsCCTVKenya
I Code LtdCCTVKenya
IbtekarConsulting servicesPortugal
ICS Technologies LTDCCTVAfrica
IndsecomCCTVSaudi Arabia
Lavender Moon Trading 180ccCablesSouth Africa
Mode Fire & Security LtdIntruder alarmUnited Kingdom (UK)
Piqcel SoutionsCCTVAfrica
Prologix DistributionWIreless Point to point , IP Camera, NVR, INdutrial Outdoor Rugged switch and routerNigeria
Puls LimitedCards and readersGlobal
Radar SecurityIntegrated securityAfrica
RayCom TechnologiesCommunication equipmentsAfrica
RJV Systems LtdIntegrated securityNigeria
Safeworld Systems Pvt. Ltd.Integrated securityIndia
Shenzhen Teswell Technology Co., LtdCCTVChina
Shoghi Communications Ltd.Electronic article surveillanceGlobal
Skylinks Technical services (GH) LtdCCTVAfrica
Syncsure Africa LimitedAccess controlAfrica
Sysnet Solutions LtdCCTVUganda
Three Sixty Vision Tech LtdAccess controlKenya
Transguard Group LLCPerimeter protectionUnited Arab Emirates
WALBUK HIGHTECH COMPANYConsulting servicesNigeria
Warrior ControlsCCTVGlobal
Xtreme CCTVCCTVSouth Africa
Page 1 of 1 page
Several electronic article surveillance installers in this directory are listed as operating in Kenya as they have indicated that their operations are global.  Please contact the companies directly using the contact information provided to confirm their ability to deliver security products and services in Kenya.
border
Featured security companies
Featured White Paper

Do you know the weakest link of your access control system?

In end-to-end security, it’s important to consider that the chain is only as strong as its weakest link. That is why it is essential that an access control system is always evaluated in its entirety, to discover where the weakest link can be found.   It is not uncommon for access control systems to be installed and then used for the longest time possible without any attention to updating the system’s intrinsic security features. There are many systems in the field that are over 10-years old, based on technologies much older than this and with no or very low cyber security protection.    Some ‘weak-links’ might be strengthened by new encryption methods, others by good process and some only by partial or entire replacement. What is essential is that for those considering investing in new technology, not to introduce weak-links.    
Latest products
Arecont Vision AV12375RS
The SurroundVideo® Omni G3 is an industry game-changing,...
MOBOTIX Mx-S26A-6D016
The MOBOTIX S26 compact Flex camera is a universally deployable, easy...
Delta Scientific MP5000
The MP5000 was built for US Federal government security specialists wanting...
Upcoming events

See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition