Quantcast
Channel: SMART Security Solutions - Published by Technews
Browsing all 15007 articles
Browse latest View live

Alpro at the riverside

Panic hardware from Alpro is being used by Middlesbrough Football Club at its Riverside Stadium.

View Article


Suprema BioStation L2

BioStation L2 is a mid-range device that easily supports enterprise-level requirements in both access control and time and attendance applications.

View Article


Latest crime figures

One area of great concern is the increasing level of crimes including violence. Key increases were murder (up by 3,2%), home robberies (up by 2,7%) and carjacking (up by 14,3%)

View Article

Setting transport asset protection standards

The Transported Asset Protection Association (TAPA), based in the Netherlands, is an internationally recognised leader in the fight against high value theft targeted (HVTT) assets crime.

View Article

70th Anniversary: Elvey 1946-2016

The year 2016 is a significant year in the long history of the Elvey Group and the company the security industry knows as Elvey Security Technologies.In the first instance, the company is 70 years old,...

View Article


Datacentrix revamps Security Operations Centre

Datacentrix, a provider of high performing and secure ICT solutions, has officially launched its overhauled Security Operations Centre (SOC), unveiling a highly intelligent service that provides...

View Article

Keeping an eye on valuable cargo

A covert escort service addresses the concerns that companies have in terms of signal jamming by nullifying its effect to a large extent.

View Article

ICASA approved WLAN products

Regal Distributors recently introduced a range of ICASA approved carrier class WLAN products and solutions for SOHO, SMEs and enterprise solutions.

View Article


Wireless locks integrated into ­access platform

The newest version of Kantech’s EntraPass Security Software includes Aperio wireless lock integration and a robust partner programme for integration with third-party technologies.

View Article


IT security drives business growth

South African businesses highlight a 30% percent increase in revenue from new business, while almost three-quarters agree identity-centric security is critical to the business.

View Article

Event-driven video surveillance platform

A centrally managed video surveillance platform has been unveiled by Keystone Electronic Solutions, a South African electronics research and development company.

View Article

ESDA golf day again a success

Manufacturers, distributors and suppliers of product to the security industry participated in the annual ESDA Golf Day in August 2016.

View Article

Omega Training Academy geared to enhance South African security skills

The Omega Training Academy, part of the Omega Risk Group, has embarked on an educational programme that will put it in the driving seat when it comes to security training.

View Article


ZKTeco launches ZKBioSecurity 3.0

ZKBioSecurity 3.0 is an all-in-one web-based security platform developed by ZKTeco, with four integrated modules: access control, video linkage, elevator control and visitor management.

View Article

Protecting against criminal use of stolen biometric data

Biometric technology is not invulnerable, but with the correct planning it is an effective authentication mechanism that binds a myriad of digital and physical credentials to a person.

View Article


Integrated biometric access

Net2 biometric integration with PIN and card access control simplifies and secures access at John Roan School.

View Article

Electronic locks are the new black

The use and versatility of electronic locks is growing and gaining traction in more organisations. Hi-Tech Security Solutions speaks to two leaders in the field.

View Article


Security versus convenient access

As digital interactions increase in volume and complexity, identity and access security have become more critical for both the organisation and end-user.

View Article

Managing visitors and contractors

Accessing gated communities and campuses, be it business, government or residential, has become a key point for newer access control technologies.

View Article

Eight best practices for identity and access management

Identity and access management (IAM) isn’t something you do once and then forget about. It’s an ongoing process, a critical part of your infrastructure that demands continuous management.

View Article
Browsing all 15007 articles
Browse latest View live