Home
About us
Back issues / E-book / PDF
Subscribe
Advertise
Handbooks ▼
Access & Identity Management
CCTV.
Residential Security
Handbooks
▸ Access & Identity Management
▸ CCTV.
▸ Residential Estate Security
Categories
▸ Editor's Choice
▸ Tech Jobs Network
▸ Career opportunities
▸ Advertise for staff
▸ News & Events
▸ Access Control & Identity Management
▸ AI & Data Analytics
▸ Asset Management
▸ Associations
▸ Conferences & Events
▸ Facilities & Building Management
▸ Fire & Safety
▸ Information Security
▸ Infrastructure
▸ Integrated Solutions
▸ IoT & Automation
▸ Perimeter Security, Alarms & Intruder Detection
▸ Power Management
▸ Products & Solutions
▸ Security Services & Risk Management
▸ Smart Home Automation
▸ Surveillance
▸ Training & Education
▸ Videos
▸ Security by Industry Sector
▸ Agriculture
▸ Commercial
▸ Education
▸ Entertainment and Hospitality
▸ Financial
▸ Government and Parastatal
▸ Healthcare
▸ Industrial
▸ Logistics
▸ Mining
▸ Residential Estate
▸ Retail
▸ Transport
×
Categories
Editor's Choice
Tech Jobs Network
▸
Career opportunities
▸
Advertise for staff
News & Events
Access Control & Identity Management
AI & Data Analytics
Asset Management
Associations
Conferences & Events
Facilities & Building Management
Fire & Safety
Information Security
Infrastructure
Integrated Solutions
IoT & Automation
Perimeter Security, Alarms & Intruder Detection
Power Management
Products & Solutions
Security Services & Risk Management
Smart Home Automation
Surveillance
Training & Education
Videos
Security by Industry Sector ▾
▸
Agriculture
▸
Commercial
▸
Education
▸
Entertainment and Hospitality
▸
Financial
▸
Government and Parastatal
▸
Healthcare
▸
Industrial
▸
Logistics
▸
Mining
▸
Residential Estate
▸
Retail
▸
Transport
PDF
Issue 3 2022
Find companies, products and services (SSBD)
Featured articles
All-mobile people management solution with facial recognition
AURA partners with OUTsurance
Enhance security and sustainability
Fire safety in financial organisations
Improving biometrics to address privacy, scale and accuracy
Integrated personal security that travels with you
IoT provides assurance in ESG initiatives
New innovations in bomb protection and cash storage
Risk reduction and cybersecurity
The cybersecurity consolidation conundrum
The leading indicators of corruption
The supervisor role in control rooms
Unrecoverable encrypted data
What just happened?
Zero Trust in financial services
From the Editor's Desk
From the editor's desk: The new old normal
Access Control & Identity Management
Biometrics and breathalysers
Contactless access control solution
From physical to virtual IDs
Identity and access management spend to reach $26 billion
Integration relieves PoPIA pressure for estates
Is the smoke beginning to clear for password security?
RealPass-N document reader
Remote management of access points
Solving coworking front-desk drama
The AI knows best
Turning electric locks mobile
Web-based access control
Agriculture
IoT asset tracking for farming
Editor's Choice
Entries open for 2022 OSPA Awards
Education
Salient Systems manages campus security
Financial
Cash management with biometrics
Keeping a constant eye open
Road blockers to prevent forced entry
Fire & Safety
Workplace fire detection: early warning is key
Industrial
Improving resiliency and efficiency
Information Security
2022 Cloud Security Report
Citrix App Protection helps secure remote workers
How the MITRE ATT&CK Framework has revolutionised cybersecurity
How to stop the costliest internet scam
Malicious file protection for mobile devices
MFA threat highlights SA’s security negligence
People and processes for banking security
Securing business information more important than ever
Securing mobile devices for a remote workforce
The 5 most common security concerns in the Web 3.0 world
The components of and need for cyber resilience
The evolution of vulnerability management
Trying to catch the big phish
VMware enhances its lateral security for multi-cloud
XM Cyber counters attacks involving Microsoft Active Directory exploits
Infrastructure
Arcserve launches N Series appliances
Disaster recovery strategies for effective business continuity
Increasing focus on cloud and app protection
Turnkey data loss prevention solution
Understanding the benefits of connectivity management
Integrated Solutions
A channel focus positions partners for success
Enhancing building efficiency with Niagara
How IoT is reshaping the future of security and surveillance
Storage is essential for a comprehensive cybersecurity strategy
News & Events
Africa’s largest data centre obtains internationally accredited certifications
Check Point Research unveils vulnerability within UNISOC baseband chipset
Companies continue to pay multiple ransom demands
Corporations protected, but not secure
Cybersecurity partnership to defend humanitarian organisations
DCC becomes sole Symantec distributor for South Africa
From Generation Z to Baby Boomers
Gallagher announces ISO 27001 certification
GJD announces new SMT Machine
Good news for gun owners
How annoying is cybersecurity?
Hytera showcases security communications at Securex
Infinidat enhances channel support
Kaspersky invests in development of neuromorphic processors
Paxton promotes Dan Drayton
Qognify appoints enterprise incident management specialist for EMEA
QR Code passwordless authentication method
Security BIS named AxxonSoft’s Distributor of the Year 2021
Significant increase in fraud in a risk-heavy environment
The Handbook of Security’s third edition has been published
Use of malware, botnets and exploits expands
Workforce shortage impacts 85% of organisations
Perimeter Security, Alarms & Intruder Detection
Electric gate safety principles
GJD launches the GEM external curtain detector
Olarm launches the Olarm PRO 4G communicator
Products & Solutions
Handheld thermography camera
LucidLink Filespaces 2.0 cloud NAS offering
New full-colour Smart Dual Illuminators camera series
RealScan S60 fingerprint reader
Retail
Four benefits of automated cash management
Security Services & Risk Management
Efficient cash handling solutions
Enabling safety in communities
How to make data governance practical
How to react in an armed robbery or home invasion
Is qualification fraud on the rise?
Privacy and human rights in an AI world
Ransomware is part of disaster recovery
SA Security becomes a part of Fidelity ADT
The murky waters of cyber warfare and insurance coverage
Virtual crime in a virtual world of work
Smart Home Automation
How to keep your smart devices secure at home
Questions to ask before signing on the dotted line
Smart home devices market growing across META
The benefits of investing in whole-house surge protection
Tips to protect your computer while working from home
Surveillance
Axis to create explosion-protected cameras
Four cameras in one
Four Dahua transmission solutions powered by PoE 2.0
New AI capabilities for WizSense
New XProtect Incident Manager
Penguins enhance fan experience with smart camera applications
Secutel’s workforce management platform
Surveillance for net zero container showroom
Video technology can improve crowd management
Training & Education
Accelerate the future with the right skillsets
Cybersecurity job opportunities
Transport
Manage reckless driving while speed cameras are offline
Outdated fleet management devices put SA road users at risk
Videos
Focused on you
Published by Technews
»
Dataweek Electronics & Communications Technology
»
Electronics Buyers' Guide (EBG)
»
SMART Security Solutions
»
SMART Security Business Directory
»
Motion Control in Southern Africa
»
Motion Control Buyers' Guide (MCBG)
»
South African Instrumentation & Control
»
South African Instrumentation & Control Buyers' Guide (IBG)
©
Technews Publishing (Pty) Ltd.
| All Rights Reserved.