|
|
Access Track
77 Clearwater Road, Lynnwood Glen, Pretoria
Core business offering: Access Track provides a rugged, modern, easy-to-use, cost-effective handheld licence scanning solution to collect visitor information. This cloud-based system allows you to replace your traditional handwritten access book, and the data is available immediately. The system is fully maintained with no hidden costs.
|
Section - Access control & identity management
-Visitor management systems
- Cloud-based
| News from Access Track: |
Electronic visitor information management system
June 2019, Access Control & Identity Management, Products & Solutions, Access Track
Access Track Integri-Register is an easy-to-use and cost-effective electronic visitor information management system aimed at replacing traditional access registers.
|
Access Track
Securex Preview 2019, Products & Solutions, Access Track
Access Track Integri-Register is an easy-to-use and cost effective electronic visitor information management system aimed at replacing traditional access registers that is suitable for use at any access ... |
Security news: |
PoPIA turns its attention to gated access
May 2026, News & Events, Security Services & Risk Management
The Information Regulator has gazetted its proposed Code of Conduct for the processing of personal information at gated access points. At 65 pages long, the code signals a significant shift in how personal information is collected and managed at entry points. |
Employees are SA’s biggest cyber threat
May 2026, Information Security, Security Services & Risk Management
South Africa experienced a 46% increase in insider cyber risk in 2026, surpassing the global average of 44%. What is more, 63% of South African companies surveyed expect insider-driven data losses to increase. |
The post-Q1 security checklist
May 2026, Asset Management, Security Services & Risk Management
By this time of year, employees have changed jobs or roles, suppliers may have changed, and devices have moved between offices, homes, and sites. This is the right time for businesses to run a practical post-Q1 security check. |
Aerial firefighter training revolution
May 2026, Fire & Safety, News & Events
Sophisticated new flight simulation software capable of accurately modelling the performance of firefighting helicopters could help train pilots to tackle wildfires more effectively and safely in the future. |
Key attributes of an effective cybersecurity leader
May 2026, Information Security, BlueVision
In an evolving technology landscape, an effective cyber leader must combine technical acumen, foresight, and adaptive leadership to mitigate risks, and risks can only be mitigated once accurately identified and remedial processes are in place. |
Tackling enterprise security ‘tool sprawl’
May 2026, Information Security, NEC XON
South African ICT solutions provider NEC XON is advocating a shift away from fragmented cybersecurity toolsets towards unified platforms, arguing that ‘tool sprawl’ is undermining the effectiveness of enterprise security operations. |
Surge in AI-enabled cybercrime and a 389% increase in ransomware
May 2026, Information Security, News & Events
Cybercrime no longer functions as a series of isolated campaigns; it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow agents. |
| visit www.securitysa.com |
|
|
|
|
|