-
Hi-Tech Security Business Directory (HSBD)
Access Automation Security Distributors

1 Gerrit Street, Ferndale, Randburg

tel:  
+27 11 793 6533
cell:  
+27 82 800 1042
email:  
[email protected]
url:  
www.securityco.co.za

Core business offering: Access Automation Security Distributors is home to security specialists. The company offers shop counter sales of access control, automation and security equipment, spares, control board exchange and repairs for trade, corporate, armed response, security shops and DIY customers.


Hide, David
Technical Manager
[email protected]
Hide, Gaby
Accounts
[email protected]
ACDC
(Sub Agency)
Agri
(Sub Agency)
Aiphone
(Sub Agency)
Aladdin
(Sub Agency)
Amatec
(Sub Agency)
Augen
(Shared Agency)
Behringer
(Shared Agency)
Beninca
(Sub Agency)
Ben-Q
(Sub Agency)
BFT
(Shared Agency)
Blaster
(Sub Agency)
BPT
(Sub Agency)
Brano Industries
(Sub Agency)
CAME
(Sub Agency)
Centor
(Sub Agency)
Centurion
(Sub Agency)
CISA
(Sub Agency)
Claws Roadway Spikes
(Sub Agency)
Codex
(Sub Agency)
Comb Communications
(Sub Agency)
Commax
(Sub Agency)
Dace
(Sub Agency)
DC Blue
(Sub Agency)
Digi
(Sub Agency)
Digidoor
(Sub Agency)
DSC
(Sub Agency)
DTS
(Sub Agency)
eLite
(Sub Agency)
Evo
(Sub Agency)
FAAC
(Sub Agency)
Flux
(Sub Agency)
Garrison
(Sub Agency)
Gemini
(Sub Agency)
Hansa
(Sub Agency)
Helix
(Sub Agency)
Hikvision
(Sub Agency)
IDS
(Sub Agency)
KOCOM
(Sub Agency)
Lattice
(Sub Agency)
LongHorn
(Sub Agency)
Look See
(Sub Agency)
Maglock
(Sub Agency)
Mecer
(Sub Agency)
Microsound
(Sub Agency)
MKII
(Sub Agency)
Nemtek
(Sub Agency)
Nice
(Sub Agency)
Nova
(Sub Agency)
OPTEX
(Sub Agency)
Paradox
(Sub Agency)
Pet Stop
(Sub Agency)
Photon
(Sub Agency)
Polophone
(Sub Agency)
Power Kingdom
(Sub Agency)
Power Systems
(Manufacturer)
pro-alpha
(Shared Agency)
PSS
(Sub Agency)
RDO
(Sub Agency)
Remez
(Shared Agency)
SDO4
(Sub Agency)
Sector
(Sub Agency)
Securi-Prod
(Sub Agency)
Sentry
(Sub Agency)
Sherlotronics
(Sub Agency)
Smart
(Sub Agency)
Solo
(Sub Agency)
Speedo
(Sub Agency)
Sudheim
(Shared Agency)
UPS
(Sub Agency)
Vantage
(Sub Agency)
Vector
(Sub Agency)
Vertex
(Sub Agency)
Xtrac Garage Door Opener
(Sub Agency)
ZKTeco
(Sub Agency)
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Dual/multi technology
- Magnetic stripe
- Proximity
- RFID
-Control systems
- Card coding/deletion/programming
- Card/keypad combination
- Multi-building
- Time & attendance integration
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Control panels
- Arm/disarm stations
- Graphic panels (icons)
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Batteries
- Battery backup
- Battery testers/analysers
- Cabinets & racks
- Installation materials
-Power or environment sensors
- AC & UPS power failure protection
- Fire
- Gas/toxic vapour
- Lightning protection devices
- Surge protection devices
- Temperature
-Radio communications
- Antennas
- Transmitters
-Remote monitoring
- GSM/cellular
-Dual technology detectors
-Infrared illuminators
-Infrared, active
-Infrared, passive (PIR)
-Loop detectors
-Motion detectors
-Photoelectric beam
-Portable intrusion detection
-Proximity sensors
-Shock detectors
-Taut wire systems
-Vehicle sensors, buried
-Vehicle sensors, drive through
-Vibration sensors
-Volumetric sensors
-Beam protectors
-Capacitance proximity detectors
-Contacts, door & window switches
-Continuity loops
- Door loops
- Electrical loops
-Emergency switches
-Frequency-tuned sensors
- Glass-break sensors (on glass)
- Shock sensors
- Vibration contacts
-Hold-up devices
-Inertia sensors
-Isolation switches
-Motion detectors
- Dual detectors
- Infrared, passive
- Microwave
- Photoelectric
- Ultrasonic
- Video motion detectors
-Panic buttons
-Proximity sensor
-Vibration/shock detectors
-Window grilles, alarms & shutters
Section - Communications equipment
-Emergency/security telephone
-GSM cellular
-Intercoms
- Push-to-talk
- Standalone intercoms
- Talk-through communicators
- Telephone intercoms
- Videophone intercoms
-IP/network
-Public address & paging systems
-Recording, audio/video equipment
-Repeaters
-Routers/modems
Section - IoT/IT security infrastructure
-Batteries - chargeable
-Batteries - non-chargeable
-Battery charging systems
-Battery packs
-Constant voltage transformer
-Fixed voltage
- AC-DC converter
- DC-DC converter
- Regulated
-Inverters
-Lightning arresters
-Other batteries & backup power supplies
-Power cables
-Power failure warning system
-Power surge protectors & filters
-Solar power solutions
-Surge protection devices
-Transformers
-Uninterruptible power supplies (UPS)
- Continuous
- Standby
-Variable voltage DC
-Voltage surge suppressors
Section - Perimeter security
-Barriers, vehicle
- Bollards
- Vehicle disabler
-Fences, electric
- Controllers, electric fence
- Insulators, electric fence
- Low-voltage surveillance (with alarm)
- Non-lethal energiser system (with alarm)
- Portable power fence auger
Section - Surveillance equipment
-Camera controls
- Multiplexers
- Pan/tilt/zoom (PTZ indoor)
- Pan/tilt/zoom (PTZ outdoor)
- Remote control devices
- Sequencers
-Cameras
- Analogue
- Body-worn cameras Cameras: Body-worn cameras
- Concealed, covert
- Fixed Cameras: Fixed
- Handheld
- High definition (HD) - IP
- High definition (HD) analogue
- Industrial use thermals
- Infrared
- Low light
- Network/IP
- Night vision equipment
- Portable Cameras: Portable
- PTZ Cameras: PTZ
- Simulated/dummy Cameras: Simulated/dummy Cameras: Simulated/dummy
-Point-of-sale (POS) systems
-Service centres (for CCTV equipment)
-Vehicle CCTV systems
-Video multiplexers
-Video recorders
- Digital video recorders (DVR)
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
-Video sequencers
Security news:
Super election year increases risks of political violence
April 2024, Editor's Choice

Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice

Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

2024 State of Security Report
April 2024, Editor's Choice

Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice

Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Cyberthreats facing SMBs
April 2024, Editor's Choice

Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Are we our own worst enemy?
April 2024, Editor's Choice

Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Protecting IP and secret data in the age of AI
April 2024, Editor's Choice

The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security

Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.