A look into the cybercriminal underground
Places in the Internet where cybercriminals converge to sell and buy different products and services exist. Like any other market, the laws of supply and demand dictate prices and feature offerings.
View ArticlePerimeter security essentials – Part 2
With a background in industrial networks for the mining environments, Roger Powell, senior sales representative at RJ Connect has written a three-part series highlighting some of the best practices in...
View ArticleThe right drive for surveillance
Buying a DVR or NVR with a hard drive is very easy today, but all too often the drive has impressive specifications in terms of the storage capacity, but little other information about the capabilities...
View ArticleHigh-end surveillance storage
Hi-Tech Security Solutions spoke to EMC and Oracle about what is important for the high-end surveillance storage market.
View ArticleROI is not a four-letter word
As security budgets tighten across most industries, security managers face increasing demand from CEOs and CFOs, to be able to deliver a return on investment (ROI).
View ArticleThe ultimate guide to PSIM
CNL Software has released a document describing exactly what PSIM (Physical Security Information Management) is and is not. This is a short extract highlighting the main points of the paper.
View ArticlePracticing good information governance
The exponential growth of data, combined with increasing regulation, has left many organisations struggling with the complexity of compliance required to manage their information.
View ArticleITEC Digital Solutions secures Cell C’s campus
Cell C has secured its new campus with the goal of centralising its operations on one campus. The company had to ensure tight security, but also ease of access for the public.
View ArticleHealthcare security without the complexity
[Hospital and healthcare security is critical at the door, for protecting patient data, and in the cloud.
View ArticleDemystifying data storage
The advent of the PoPI (Protection of Personal Information) Act sent many companies reaching for the tranquilisers. Ignorance of the Act is no excuse but organisations can quickly and easily come to...
View ArticlePlanning and strategy first
Video management systems, are they worth what they cost, do they simplify or complicate operations, are they used as they were intended?
View ArticleIntegrated management platforms
Hi-Tech Security Solutions asked a few management platform vendors for their views on the market and the evolution of VMS and PSIM. Integration is all the rage, even for security management platforms
View ArticleArecont energises South African presence
Megapixel surveillance manufacturer Arecont Vision is targeting South and southern Africa as growth markets. To achieve its goal in the region, the company is improving its current channel strategy by ...
View ArticlePoor playback undermines CCTV advances
Dr Craig Donald shares his frustration over the poor playback capabilities in what are supposed to be today’s high-end CCTV cameras.
View ArticleNext generation LTE communications
Mission-critical handheld LTE device provides first responders with exceptional broadband connectivity.
View ArticleLessons from the NPA: When the past comes back to haunt you
More skeletons have fallen out of the National Prosecuting Authority’s closet, throwing security flaws within government into the spotlight once again. Could the same types of breaches be happening...
View ArticleStadium technologies for Brazil
Johnson Controls integrates building, fire and security systems to improve safety and comfort for The FIFA World Cup in Brazil.
View ArticleTurning security alarms into social alarms
Essence is changing the way installers can address residential security, extending traditional security technologies into home automation apps and intelligent elderly care.
View ArticleIP takes the industry forward
Dan Drayton, Paxton’s sales manager, believes the move towards IP technology will have a positive impact on the South African market.
View ArticleThe cost of non-compliant hiring
Security Association of South Africa: The hidden costs and consequences of contracting non-compliant security providers.
View Article