-
Hi-Tech Security Business Directory (HSBD)
Access Track

77 Clearwater Road, Lynnwood Glen, Pretoria

tel:  
+27 12 348 0336
cell:  
+27 60 997 3491
email:  
kevin@accesstrack.co.za
url:  
www.accesstrack.co.za

Core business offering: Access Track provides a rugged, modern, easy-to-use, cost-effective handheld licence scanning solution to collect visitor information. This cloud-based system allows you to replace your traditional handwritten access book, and the data is available immediately. The system is fully maintained with no hidden costs.


Pretoria

tel: +27 12 348 0336
sales@accesstrack.co.za
Smith, Kevin
Sales
kevin@accesstrack.co.za
Section - Access control & identity management
-Visitor management systems
- Cloud-based
News from Access Track:
Electronic visitor information management system
June 2019, Access Control & Identity Management, Products & Solutions, Access Track

Access Track Integri-Register is an easy-to-use and cost-effective electronic visitor information management system aimed at replacing traditional access registers.

Access Track
Securex Preview 2019, Products & Solutions, Access Track

Access Track Integri-Register is an easy-to-use and cost effective electronic visitor information management system aimed at replacing traditional access registers that is suitable for use at any access ...

Security news:
PoPIA turns its attention to gated access
May 2026, News & Events, Security Services & Risk Management

The Information Regulator has gazetted its proposed Code of Conduct for the processing of personal information at gated access points. At 65 pages long, the code signals a significant shift in how personal information is collected and managed at entry points.

Employees are SA’s biggest cyber threat
May 2026, Information Security, Security Services & Risk Management

South Africa experienced a 46% increase in insider cyber risk in 2026, surpassing the global average of 44%. What is more, 63% of South African companies surveyed expect insider-driven data losses to increase.

The post-Q1 security checklist
May 2026, Asset Management, Security Services & Risk Management

By this time of year, employees have changed jobs or roles, suppliers may have changed, and devices have moved between offices, homes, and sites. This is the right time for businesses to run a practical post-Q1 security check.

Aerial firefighter training revolution
May 2026, Fire & Safety, News & Events

Sophisticated new flight simulation software capable of accurately modelling the performance of firefighting helicopters could help train pilots to tackle wildfires more effectively and safely in the future.

Key attributes of an effective cybersecurity leader
May 2026, Information Security, BlueVision

In an evolving technology landscape, an effective cyber leader must combine technical acumen, foresight, and adaptive leadership to mitigate risks, and risks can only be mitigated once accurately identified and remedial processes are in place.

Tackling enterprise security ‘tool sprawl’
May 2026, Information Security, NEC XON

South African ICT solutions provider NEC XON is advocating a shift away from fragmented cybersecurity toolsets towards unified platforms, arguing that ‘tool sprawl’ is undermining the effectiveness of enterprise security operations.

Surge in AI-enabled cybercrime and a 389% increase in ransomware
May 2026, Information Security, News & Events

Cybercrime no longer functions as a series of isolated campaigns; it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow agents.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.