-
Hi-Tech Security Business Directory (HSBD)
Lectro Group Security

365 Stateway, Doorn, Welkom

tel:  
+27 57 352 2911
fax:  
+27 57 352 6751
cell:  
+27 82 909 7911
email:  
[email protected]
url:  
www.lgsecurity.co.za

Core business offering: Lectro Group Security is based in Welkom and operates in the gold fields, supplying a 24-hour service to industrial, commercial and domestic clients. The 24-hour control room is based in Welkom and caters for alarm, CCTV and vehicle tracking monitoring.


Welkom

tel: +27 57 352 2911
fax: +27 57 352 6751
[email protected]
Muller, Susan
Administration
[email protected]
Ajax Systems
(Installer)
Centurion
(Sub Agency, Installer)
Impro
(Installer)
Nemtek
(Installer)
Paradox
(Installer)
Rediview
(Sub Agency, Installer)
Texecom
(Sub Agency, Installer)
Section - Access control & identity management
-Facial recognition
-Fingerprint analysis
-Iris recognition
Section - Alarm systems - sensors, panels & systems
-Control panels
- Arm/disarm stations
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Batteries
- Battery backup
- Battery testers/analysers
- Cabinets & racks
- Installation materials
-Power or environment sensors
- AC & UPS power failure protection
- Water presence/level
-Radio communications
- Transmitters
-Remote monitoring
- GSM/cellular
-Audio
-Dual technology detectors
-Infrared illuminators
-Infrared, passive (PIR)
-Loop detectors
-Motion detectors
-Photoelectric beam
-Portable intrusion detection
-Shock detectors
-Vehicle sensors, buried
-Vibration sensors
-Contacts, door & window switches
-Continuity loops
- Door loops
-Emergency switches
-Frequency-tuned sensors
- Dual detection
- Glass-break sensors (on glass)
- Shock sensors
- Vibration contacts
-Motion detectors
- Dual detectors
- Infrared, passive
- Microwave
- Video motion detectors
-Panic buttons
-Seismic sensors
-Vault alarm
-Vibration/shock detectors
Section - Building management
-Personnel services
Section - IoT/IT security infrastructure
-Network management solutions
-Remote access technologies
-Routers
-Switches
-Alarms & intrusion
-Guarding services & solutions
-Installation/integration services
-Perimeter
-Power management
- Solar/Green solutions
- UPS/batteries
-Surveillance
Section - Other security equipment
-Alarms
- Interior
- Perimeter
-Anti-hijacking systems
-Tracking devices
- GSM
- Satellite (GPS)
-Vehicle tracking
Section - Service providers
-Control rooms
- Design & construction
- Management
-Services offered
- Alarm monitoring
- Reaction & dispatch
- Recovery
- Video analytics
- Video monitoring
-Employee screening/background investigations
-Guarding & outsourced security services
-Investigative services
-Psychological testing
-Risk assessments/audits
-Truth verification/polygraph services
-Security in general
-Technical focus
- Access control
- CCTV, surveillance
- Control room design & management
- Perimeter security, alarms & intruder detection
-Agriculture
-Commercial
-Residential estates
-Retail
-Warehousing
-Armed reaction
-Guarding services
-Investigative services
-Remote monitoring
-Control room design
-Monitoring services
-Security as a Service
-Access control systems
- Access control systems
- Biometric systems
- Cloud-based/hosted systems
- Personnel booths & mantraps
- Revolving doors & turnstiles
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - domestic
- Market segment served - industrial/commercial
- Wireless
-Perimeter security
- Electric fencing
- Gate & door automation
- Intruder detection (exterior)
- Non-electric fencing
- Parking barriers
- Vehicle detection
-Surveillance systems
- Covert surveillance
- IP/analogue surveillance
- Remote monitoring
-Vehicle security systems
- Vehicle tracking, fleet management systems
-Commercial
-Residential estates
-Retail
-Safe city
-Access control
-Alarms, intrusion, perimeter
-CCTV/surveillance
-Management/supervisor skills
-Remote monitoring operator training
-Risk management
-Security management
Section - Surveillance equipment
-Anti-theft devices
-Consoles/enclosures for CCTV systems
-Housings, camera
- Domes/spheres/hemispheres
- Vandal-proof
-Video monitors
-Video multiplexers
-Cables
-Camera test targets
-Connectors
-Enclosures
-Mounting brackets, accessories
-Video analytics
- AI-enhanced analytics
- Server-based
-Video management systems (VMS)
-Camera controls
- Pan/tilt/zoom (PTZ indoor)
- Pan/tilt/zoom (PTZ outdoor)
- Remote control devices
- Switchers
-Cameras
- Body-worn cameras Cameras: Body-worn cameras
- Fixed Cameras: Fixed
- High definition (HD) - IP
- High definition (HD) analogue
- Network/IP
- PTZ Cameras: PTZ
-Digital video systems
- Remote monitoring systems
- Visual verification systems
-Lenses
- Fixed focal length
- Panoramic
- Special-purpose
- Varifocal
- Zoom (motorised)
-Video recorders
- Digital video recorders (DVR)
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
Security news:
Super election year increases risks of political violence
April 2024, Editor's Choice

Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice

Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

2024 State of Security Report
April 2024, Editor's Choice

Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice

Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Cyberthreats facing SMBs
April 2024, Editor's Choice

Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Are we our own worst enemy?
April 2024, Editor's Choice

Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Protecting IP and secret data in the age of AI
April 2024, Editor's Choice

The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security

Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.