South Africa News
Secure payment card technology at the point of sale and a strong authentication are effective defences against data security threats Data security is one of the top concerns to a retailer’s reputation and its customers’ privacy. The fall-out can be catastrophic, and organisations must understand the threat and take all necessary steps to protect their assets and customers. The challenge has become more complex with the explosive growth in mobile device usage throug...
Trump’s border wall proposal reflects a rising demand forgreater border security When GOP presidential candidate Donald Trump proposed building a wall along the length of the U.S.-Mexican border, some ridiculed the idea. Yet, it also struck a nerve among Americans deeply concerned about unchecked illegal immigration. "I would build a great wall, and nobody builds walls better than me, believe me, and I'll build them very inexpensively. I will build a great, great wall o...
Biometric solutions are replacing PINs at physical ATMs and providing a more fool-proof form of identification for banking security Biometrics is seeing especially rapid adoption rates throughout the worldwide banking infrastructure, particularly at the ATM and teller counter, says Phil Scarfo, VP worldwide marketing, biometrics, HID Global. “There are also opportunities for biometrics to improve security by enabling transaction-based authentication for online and mobi...
On event days, representatives of emergency response & security agenciesare together and running sports venues as a unified group In the world of sports security, alliances are bringing together personnel and agencies that once only talked to each other during an emergency. Consider the recently announced agreement between the Security Industry Association (SIA) and the National Center for Spectator Sports Safety and Security (NCS4). This memorandum of understanding (MOU)...
I suspect that many people – especially travellers – associate the idea of “security” with what they see at the airport screening line. If that’s the case, our market’s image suffers from the association. I’m not sure what that is, that happens at airport screening gates, but I don’t think it’s security. Rather than actual security, the practice seems aimed more at making the travelling public feel safer (if that’s possible even as th...
There are between 4 and 6.8 million lone workers in the UK, and many of us arelone workers at some point in our working lives The Suzy Lamplugh Trust was set up to highlight the risk faced by lone workers and to offer information and advice to reduce the risk of violence and aggression for everyone. It was established following the disappearance in 1986 of 25-year-old estate agent, Suzy Lamplugh, after she had gone to meet an unknown client. This article is based on a present...
Citilog specialises in analytics tools & sensors for incident detection, traffic data collection & intersection control Axis Communications, the global leader in network video, announced the acquisition of Citilog, a provider of intelligent real-time video monitoring for traffic and transportation security and safety. The addition of their advanced surveillance technology and experienced personnel strengthens Axis’ best-of-breed solution and further expands its o...
FLIR SR-19 security camera is primarily designed for perimeter surveillance and asset protection Providing secure facilities, and keeping marinas a safe environment, should be a basic responsibility of marina management. Protection can be achieved through a combination of security policies, controlled access, observation and user awareness. Although it has not reached epidemic proportions yet, crime is a growing threat to recreational boating. Modern boats are equipped with st...
IFSEC International 2016 will be a strategically significant platform to present current technologies and research In 2016 IFSEC International, Europe’s largest security exhibition, will feature a dedicated Smart Zone, comprising a replica ‘smart home’ fitted out with the latest home automation innovations from top exhibitors including Y3K, Lilin and Control 4. Taking place at London’s ExCeL from 21-23 June, IFSEC International 2016 will be a strategica...
Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from...
South Africa's Garden Route is world famous. It is a popular and scenic stretch of the southern coast of South Africa. It includes towns such as Mossel Bay, George, Knysna, Oudtshoorn, Plettenberg Bay and Nature's Valley. The area is renowned for its magnificent mountains, indigenous forests, lakes, lagoons and rivers. It is along the Garden Route, in Heroldsbay that the spectacular Oubaai Golf Resort is situated. Recently, The Oubaai Homeowners Association, as part of...
The universe of biometric authentication applications is expanding rapidly invertical markets such as healthcare and retail Once used mostly to secure high-value government facilities, biometrics are now a basic tool used in a variety of vertical markets. This article will look at some of those opportunities. For healthcare organisations, for example, biometric authentication is being used for secure medical dispensing to streamline workflow and control drug diversion, and f...
Sports stadiums and leagues are constantly pushing for higher security standards & best practices to strengthen venues that may be perceived as "soft targets" Terrorism threats have focused the attention of sports security professionals like Paul Turner, Director of Event Operations & Security for AT&T Stadium in Arlington, Texas, on how to more effectively screen guests and ensure that fans and athletes are kept safe. It has made the sobering reality that stad...
FLIR cameras contain Vanadium Oxide detector and produce excellent image on which the smallest of details can be seen A big sign, stating: “Diamond theft hurts us all – Don’t do it”, is one of the first things visitors see when they arrive at the small airport of Oranjemund, Namibia. Oranjemund, meaning mouth of the Orange River is situated in the far south western corner of Namibia. The town was established in 1936, following the discovery of diamonds...
Johnson Controls and Tyco announced that they have entered into a definitive merger agreement under which Johnson Controls, a global multi-industrial company, will combine with Tyco, a global fire and security provider, to create the leader in building products and technology, integrated solutions and energy storage. Under the terms of the agreement, which has been unanimously approved by both companies' Boards of Directors, Johnson Controls shareholders will own approximately 56 percent o...
Many people who decide to run, hide or fight during an active shooter event survive. John Matthews, a decorated law enforcement veteran and nationally known public safety consultant, studies this premise in his 2013 book: Mass Shootings: Six Steps to Survival. “To survive, you have to be mentally prepared,” Matthews says. “You have to know what to do the minute the first shots ring out.” For his book, Matthews researched 60 mass shootings that occurred between 1980 and...
FLIR SR-50 thermal imaging cameras cover the entire perimeter around the DBSA with only four cameras The Development Bank of Southern Africa (DBSA) is one of several development finance institutions in South and Southern Africa. The head office of the DBSA is located in Midrand, close to Pretoria, South Africa. The purpose of the DBSA is to accelerate sustainable socio-economic development by funding physical, social and economic infrastructure. DBSA’s goal is to im...
TeleEye video analytics seamlessly integrates with FLIR thermal imaging security cameras at the solar farms Solar power is hot in South Africa. With the construction of two new solar farms in the Northern Cape Province in 2012, PV specialist Tenesol started another of the many renewable energy projects that are popping up in South Africa. To protect its valuable solar panel assets against unwanted intruders, Tenesol called upon security specialist TeleEye, a firm believer in t...
Jemez received the award for integration of Eagle-i Edge software built upon the Axis Camera Application Platform Jemez Technology was named 2015 Technology Integration Partner of the Year by Axis Communications at its 10th annual Axis Connect & Converge Conference (ACCC). Axis, the global leader in network video, presented these annual awards to top channel, software and technology partners. Axis and Jemez collaboration Jemez Technology received this award for the innov...
Shortly after the initial installation of the SeeTec security solution, crimein the district decreased by 25 % With four shopping centres, 33 car dealerships, one casino and two hotels, Riverside Park, a City Improvement District (CID) in Nelspruit, South Africa, offers a wide sphere of activity for tradesmen, investors and proprietors. In city development, the introduction of so called “Business Improvement Districts” is a preferred means to create sustainably...
Key control technology and guard tour systems provide a ready-made solution for healthcare organisations to enhance their security & asset management protocols Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key control systems, asset lockers and guard tour systems. The shift from manpower resources to technology as a main line of defence is having a significant impact on...
Security is becoming increasingly business-like, with corporate security departments having to justify their budgets and support business operations Persistent crime — both physical and logical — and the rise of terrorism around the world have led more and more corporations to expand their focus on security. In that effort, C-suite executives have added significantly to the responsibilities of corporate security departments. Security functions have grown far b...
As we face 2016, identity management has become more critical to successful security operations. Recent acts of terrorism, border security issues, and the refugee crisis are just a few examples that remind us of the potential risks we face today. As a result, identity management is now firmly cemented into prospective security models across the public and private sectors. In recent years, organisations and government bodies worldwide have begun to rely increasingly on biomet...
Access control and video systems have always yielded a lot of data, although historically much of it has been stored on hard disk drives and later overwritten and/or dumped. A new trend is to compile that data over time, organise it, analyse it and then use it to provide insights into how the enterprise operates. Analysing data from different sources and departments It’s part of a trend called Big Data, but so far its use in the physical security market has been limited. One company tha...
As the security industry continues to grow, recruiting must have more sophisticatedscreening and hiring processes, and a commitment to hiring quality personnel The physical security industry today is driving focus on finding the right talent. Deborah O’Mara, SourceSecurity.com's dealer/integrator correspondent, in an exclusive Q&A with Brent O’Bryan, Vice President of Training and Development for AlliedBarton Security Services, discuss the challenges that secur...
Determining how the cloud can best support your business depends on fivefactors: Bandwidth, storage, cost, security and accessibility Until about a decade ago, most enterprises used their video surveillance systems primarily to view live video or review security incidents after the fact. Today, many are taking advantage of intelligent video solutions to reduce losses from theft and fraud, monitor and improve customer service, track commercial conversion rates and performance t...
Strong electronic access control (EAC) investments by the healthcare and education verticals were a highlight of a very strong 2015 for Allegion. The company saw double-digit growth in multiple categories for its electronics as well as continued strong growth in commercial markets, with further expansion of software provider integration of Allegion-connected devices. Mobile connectivity & system integration nurture positive trends Demand for mobile connectivity and inte...
One of the benefits of newer IP systems is the ability to store video inside the camera or in a nearby digital video recorder (DVR) at the edge of the network. Edge-based storage is unlikely to take the place of centralised storage, but it is complementary and provides some interesting new options related to system design. We asked this week’s Expert Panel Roundtable: What is the value of edge-based storage and in what specific applications?
Facial and body behavior analytics can identify people “without interferingwith the pace of life” Biometrics companies throughout the security marketplace are expanding the functionality of their systems for a variety of uses. This article will take a look at what several companies are up to. SRI International’s identity solutions seek to bring convenience, speed and security to existing workflows. SRI’s Iris on the Move (IOM) biometric systems ca...
With increased demand for high-security door locks in all the vertical markets we serve, the last year has been very good for Securitech. Looking forward, we expect this across-the-board growth to continue, as we continue to listen and respond to customer demands and closely monitor industry trends. In recent years, the security industry has witnessed a growing trend towards development of user-friendly access control solutions that enable customers to have complete control...
Browse security news
Featured products
Related videos
CLIQ Connect
DNAKE Access Control Terminals: Minimalist Design, Maximum Security!
Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download- South Africa Security companies
- South Africa Manufacturers
- South Africa Distributors
- South Africa Resellers / Dealers / Reps
- South Africa Installers
- South Africa Consultants
- South Africa Systems integrators
- South Africa Events / Training / Services
- South Africa Manned guarding
- South Africa Training organisations
- South Africa Associations / regulatory bodies
- South Africa Event organisers
- South Africa Media
- South Africa Recruitment / personnel
- South Africa Services
