|
|
SAFD Systems
Unit B, 5 Cramond Road, Cape Town
Core business offering: SAFD Systems offers the conception, implementation, service, and support of security, evacuation, and control systems designed to improve security and productivity for retailers, property administrators, small to corporate-sized businesses, industrial/educational institutions, and body corporates.
|
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Proximity
- RFID
- Smartcard
-Control systems
- Card coding/deletion/programming
- Card/keypad combination
Section - Communications equipment
-Public address & paging systems
-Recording, audio/video equipment
Section - IoT/IT security infrastructure
-Access control
- Card readers
Section - Service providers
-Risk assessments/audits
-Security assessment & policy
-Risk assessments
-Technical focus
- Access control
- Asset management, EAS, RFID
- CCTV, surveillance
- Fire & safety
- Identity management
- Perimeter security, alarms & intruder detection
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Cloud-based/hosted systems
- Smartcard systems
- Visitor management systems
- Visitor tracking systems
- Workforce management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Evacuation systems
- Network communications
- Radio, 2-way & paging systems
- Video/audio intercom systems
- Wireless (incl. cellular)
-Locks and safes
- Electronic locks
-Perimeter security
- Intruder detection (exterior)
- Vehicle detection
-Surveillance systems
- Covert surveillance
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
- Video management systems
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Healthcare
-Industrial & manufacturing
-Retail
-Warehousing
-Access control
-Alarms, intrusion, perimeter
-CCTV/surveillance
Security news: |
IQ and AI
Issue 6 2025, Surveillance, Editor's Choice, AI & Data Analytics, Leaderware
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms. |
Is your entrance security secure?
Issue 6 2025, Access Control & Identity Management, News & Events, Smart Home Automation, SMART Security Solutions, Centurion Systems, Technews Publishing
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security. |
What is your ‘real’ security posture? (Part 2)
Issue 6 2025, Information Security, Infrastructure, Editor's Choice, BlueVision
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them. |
ONVIF to end support for Profile S
Issue 6 2025, Surveillance, News & Events
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011. |
HMA takes on Africa’s fire market
Issue 6 2025, Fire & Safety
HMA South Africa is positioning itself as a trusted partner in fire detection, suppression, and explosion-proof safety solutions across the continent, offering clients regulatory compliance as well as long-term protection for mission-critical operations.
|
New agent gateway to mitigate shadow MCP risk
Issue 6 2025, AI & Data Analytics
Agent Gateway, a new capability in the Tray AI Orchestration platform, gives IT power to develop approved MCP tools with policies, permissions, versioning and compliance, then publish them via MCP for secure agent use. |
Syndicates exploit insider vulnerabilities in SA
Issue 6 2025, Information Security, Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.
|
The overlooked risks of everyday connectivity
Issue 6 2025, Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security. |
| visit www.securitysa.com |
|
|
|
|
|