Key management in the spotlight
Key management today is no longer a case of having your secretary keep the keys in her desk drawer and only hand it out to people she considers acceptable. It has become a science.
View ArticleAn eye on remote monitoring
Successful remote monitoring services depend on designing solutions that meet customer demand. Hi-Tech Security Solutions looks at some trends in this market.
View ArticleBest practices for key control and asset management
Key control and asset management technology is a reliable and cost effective method to improve security by ensuring that facility keys are properly managed with regard to access, storage and tracking.
View ArticleTS2000 Tripod Turnstiles
The TS2000 is a semi-automatic bi-directional bridge tripod turnstile with a well-designed, two-legged casework made of stainless steel.
View ArticleAPC Smart-UPS
Schneider Electric introduces Smart UPS C, an efficient, true sine-wave power protection for entry-level servers and network equipment.
View ArticleDynaGuard M Series Embedded NVR
Security & Communication Warehouse has announced that Dynacolor has recently launched the DynaGuard M Series Embedded NVR.
View ArticleSecurex 2015 a success
Securex 2015 was a resounding success, with 5323 industry professionals visiting the exhibition between 12 and 14 may at Gallagher Convention Centre.
View ArticleBenefits of video alarm verification
Video verification has grown in popularity due in part to false alarm reduction efforts. However, video verification provides benefits well beyond reducing false alarms.
View ArticleEntertainment needs reliable storage
Hi-Tech Security Solutions spoke to Kalvin Subbadu, sales manager for WD Components in South Africa, about the need for adequate recording capacity in the entertainment surveillance sector.
View ArticleHosted security services
Cloud services can be useful, cost effective and beneficial, but take care of your security first. Michael Horn, BU manager for security at CA Southern Africa elaborates on being secure out in the...
View ArticleThe profit motive in security
Getting past the 'grudge purchase' issues in security is becoming easier as integrators find ways to expand the scope of security products and deliver value to other areas of the business.
View ArticlePutting jammers in a jam
The Pulsit solution monitors the signals from a vehicle in transit and as soon as it detects jamming, it ‘limps’ the vehicle, making it useless to potential hijackers.
View ArticleFB1000 Flap Barrier series
The FB1000 Flap Barriers are well adapted to entrances and exits of buildings, to help tracking staff and visitors. Only authorised users are able to access specific areas through the flap barriers.
View ArticlePreventing false alarms
Coordinated lightning and surge protection prevents false alarms or the destruction by atmospheric discharges or switching over voltages and increases the availability of alarm systems.
View ArticleMiRO’s training receiving great reception
Wireless IP convergence company MiRO is receiving extremely positive feedback from customers who have attended its free IP-CON training programme this year.
View ArticleESDA Golf Day
The Electronic Security Distributors Association (ESDA) will be hosting its annual Golf Day on Tuesday 25 August 2015 at the Modderfontein Golf Club. The cost will be R2500 per four-ball, with this...
View ArticleSuprema BioStation 2
BioStation 2 leverages powerful hardware and sophisticated algorithms allowing it to match and authenticate fingerprints up to 20 000 per second.
View ArticleBiometric access evolves
Biometrics for access control has evolved over the past few years and new trends are currently emerging as customer demand continues for increased functionality and user friendliness.
View ArticleChoosing the right security partner
Xone highlights the new trend for customers to seek a specialist partner who can deliver a complete service and potentially save customers millions.
View ArticleAn ancient form of security
Remote CCTV monitoring might be seen by some as a new fad on the security scene, but the strategy behind it is one that has stood the test of time.
View Article