SMART Security Solutions Magazine


Featured articles


Seven tips to help ensure your backup batteries work
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...

Standards for fire detection
Nick Collins discusses standards for commissioning and handing over a fire project once the installation is complete.

Read more...

Keeping safety central to enterprise risk management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...



Milestone announces a platform to enable access to data and train AI models
Surveillance, AI & Data Analytics

Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.
read more


Stallion repositions itself as a services provider
News & Events, Security Services & Risk Management

Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.
read more


The role of advanced technologies in ransomware recovery
Information Security

As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.
read more


Gallagher Security expands Digital Badge Programme
News & Events, Access Control & Identity Management, Training & Education

Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.
read more


Kaspersky KATA 7.0 for targeted attack protection
Information Security, Products & Solutions

] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.
read more


Integrated Control Technology and Ingram Micro sign distribution agreement
News & Events, Access Control & Identity Management

Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.
read more


Benchmark in long-range surveillance
Duxbury Networking, Surveillance, Products & Solutions

Duxbury Networking says the long-range, high-resolution monitoring AXIS Q1809-LE bullet camera has been enhanced further with integration into Milestone XProtect to set a new standard for forensic-level image clarity, intelligent event detection, and enhanced security management.
read more


Finding cybersecurity's place in the world
Information Security

Cybersecurity continues to be marginalised as a technology topic, but this is beginning to change, and three trends indicate that we are progressing towards recognising cybersecurity as more of a social and business imperative.
read more


Cybersecurity best practice
Information Security, Security Services & Risk Management

Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.
read more


Palm-vein biometric kiosks secure SAP at Transnet Engineering
Access Control & Identity Management, Transport (Industry), Videos

Securing access to SAP is essential to avoid fraud or corruption. Ensuring that users can access the software quickly, easily, and conveniently to do their jobs is also essential.
read more


The algorithm of trust
Information Security, AI & Data Analytics

Artificial intelligence is not just enhancing threats, it is providing organisations with a smart line of agile and detectable defence.
read more


Strategies for combating insider threats
Information Security, Security Services & Risk Management

In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers
read more


JVA Perimeter Patrol 6
Products & Solutions

Stafix Electric Fence and Security Centres has announced that it now provides customers with the latest JVA Perimeter Patrol 6 software package for standalone and piggyback electric security fence solutions.
read more


Six key security technology trends in 2025
Axis Communications SA, Surveillance

Axis Communications examines some new trends for the security sector in 2025, as well as some new, old trends that are once again highlighted because of their benefit to the end user in the race to obtain optimal value from technology installations.
read more


Counting people and vehicles in large crowds
Products & Solutions

The new Dallmeier AI High Resolution Counting App enables precise counting even with a large number of people and vehicles in the analysis area, including the definition of multiple counting zones.
read more


Empower individuals to control their biometric data
Information Security, Access Control & Identity Management, Security Services & Risk Management

What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.
read more


Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence, Editor's Choice, News & Events, Security Services & Risk Management

Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.
read more


The need for integrated control room displays
Leaderware, Editor's Choice, Surveillance, Training & Education

Display walls provide a coordinated perspective that facilitates the ongoing feel for situations, assists in the coordination of resources to deal with the situation, and facilitates follow up by response personnel.
read more


Nice launches DC Blue Astute garage door motor
Nice Group South Africa, Technews Publishing, News & Events, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection

Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.
read more


2024, the year of Fraud-as-a-Service
Information Security

A report from AU10TIX outlines how ‘the industry’s dark engine’ offers user-friendly fraud kits that enable amateurs to execute complex attacks against thousands of accounts in minutes.
read more


Mobile credentials broaden their scope
SMART Security Solutions, Suprema, neaMetrics, Access Control & Identity Management

Using smartphones as access credentials eliminates the risks associated with lost or stolen cards, provides additional confidence in the identity of those entering or accessing, and delivers accurate data for improved building management operations.
read more


Only 6% of executives in Africa expect a decrease in headcount due to AI
News & Events, AI & Data Analytics

Boston Consulting Group research shows 72% of African companies rank AI and/or GenAI as a top three strategic priority, while 65% of African companies surveyed are optimistic about the role of AI agents.
read more


AI-powered cyber threats drain security budgets
Information Security

Research shows that 60% of IT directors strongly agree that the Metaverse, AI and machine learning will drive more cyberattacks, while only one in three believe their organisation understands Web3 cyber risks.
read more


Q-Vision Pro Wins Best of Innovation Award
Suprema, Access Control & Identity Management, News & Events

Suprema AI, a specialised provider of on-device AI solutions based on video analysis, announced that it has won the Best of Innovation Award in the Embedded Technology category at CES 2025.
read more


Get ready for bigger, bolder attacks
Information Security

While threat actors continue to rely on many classic tactics that have existed for decades, FortiGuard Labs’ threat predictions for the coming year largely focus on cybercriminals embracing bigger, bolder, and—from their perspectives—better attacks.
read more


Stay safe while using AI assistants
Kaspersky, Information Security, News & Events, AI & Data Analytics

The new DeepSeek AI assistant has attracted a lot of attention, including the interest of cybercriminals. Kaspersky experts have detected scam activity related to it.
read more


Scammers take advantage of desperate need for cash
Editor's Choice, News & Events, Security Services & Risk Management

Revitalised from their end-of-year holiday, South Africans typically tackle the new year with gusto and renewed vigour, but so do the criminals as they prepare for the rush back to school or university
read more


More options for advanced AI analytics
Surveillance, Products & Solutions

The new IDIS Edge AI Camera Plus range offers users flexible options to upgrade their video systems by targeting the power of advanced AI video analytics on priority locations for enhanced vigilance and monitoring 24/7.
read more


IoT connectivity management platform market to grow
Technews Publishing, IoT & Automation

Market dynamics in the IoT CMP market have evolved in recent times as vendors focus on responding to the challenge of declining ARPUs for IoT connectivity services.
read more


Partnership delivers 40% storage savings for surveillance
Surveillance, Infrastructure

Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.
read more


Addressable smoke detector
Dahua Technology South Africa, Products & Solutions, Fire & Safety

Dahua’s addressable smoke detector connects to the addressable fire alarm control panel and analyses ambient smoke concentration through an intelligent algorithm to trigger alarms.
read more


Is the HVAC market in SA missing the big picture?
Facilities & Building Management

The right service provider and the appropriate technical expertise offer customers pinpoint accuracy control and the highest efficiency and lowest energy and operating costs from integrating the latest technical innovations.
read more


Dahua launches 2-wire hybrid video intercom system
Dahua Technology South Africa, Smart Home Automation, Access Control & Identity Management, Residential Estate (Industry)

Dahua Technology has launched a 2-Wire Hybrid Video Intercom System (the Dahua EACH Series) that redefines residential security and communication with its high image quality and easy deployment features.
read more


Hexagon unveils new collision avoidance system adding 4D radar
Surveillance, News & Events, Mining (Industry)

Hexagon announced today the newest generation of its advanced Hexagon Collision Avoidance System (CAS), which now supports 4D radar technology, enhanced insights, and interoperability with the Hexagon Personal Alert tagging system.
read more


New data privacy trends increase large cyber claims
Security Services & Risk Management, News & Events

Frequency and value of sizeable cyber insurance claims up 14% and 17% year-on-year in the first half of 2024, with a growing trend in the US for litigation against large corporations related to privacy violations.
read more