|
V-Cam Security
261 8th Road, Bredell, Kempton Park
Core business offering: V-Cam Security is an importer and distributor of CCTV and access control equipment.
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
Avigilon
(Shared Agency) |
IDEMIA
(Sub Agency) |
Paxton
(Sub Agency) |
TVT
(Sub Agency) |
Virdi
(Sub Agency) |
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Dual/multi technology
- Proximity
- RFID
- Smartcard
-Control systems
- Card coding/deletion/programming
- Card/keypad combination
- Control reports
- Integrated building management
- Lift/elevator control software
- Multi-alarm capability
- Multi-building
- Remote monitored/hosted
- Storage/backup control software
- Time & attendance integration
-Facial recognition
-Fingerprint analysis
-Hand geometry
-Iris recognition
-Retinal scan
-Door entry systems
-Electronic locking systems
-Exit systems
- Electronic
-Portals (mantraps)
-Portals
- Biometric
- Card/PIN
- Programmable
- Pushbutton
-ID card systems
-ID cards
-Identity management systems
Section - Asset management
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Physical security - locks, safes & containers
-Key switches
-Keypads
-Strikes, electronically released
-Timelocks, electronic
-Touchpads
Section - Surveillance equipment
-Anti-theft devices
-Consoles/enclosures for CCTV systems
-Housings, camera
- Domes/spheres/hemispheres
- Dust-proof
- Ergonomic (indoor)
- Explosion-proof
- Extreme environmental
- Heater/defroster kits
- High-temperature
- Integrated low-light enhancement
- Pressurised
- Special-purpose
- Vandal-proof
- Washer & wiper units
- Weather-proof
-Lighting
- Control devices
- Fixtures
- Infrared
- Portable generators & lights
- Security
-Unmanned Aerial Vehicles (UAV)/drones
-Video monitors
-Video multiplexers
-Light meters
-Mounting brackets, accessories
-Tools
-Towers
-Video analytics
- On-camera
- Remote/cloud-based
- Server-based
-Video management systems (VMS)
-Camera controls
- Multiplexers
- Pan/tilt/zoom (PTZ indoor)
- Pan/tilt/zoom (PTZ outdoor)
- Remote control devices
- Sequencers
-Cameras
- Analogue
- Combination thermal & visual sensors
Cameras: Combination thermal & visual sensors
- Concealed, covert
- Fixed
Cameras: Fixed
- High definition (HD) - IP
- High definition (HD) analogue
- Industrial use thermals
- Infrared
- Low light
- Network/IP
- Night vision equipment
- PTZ
Cameras: PTZ
- Simulated/dummy
Cameras: Simulated/dummy
Cameras: Simulated/dummy
-Digital video systems
- Remote monitoring systems
- Storage systems
- Video enhancement systems
- Visual verification systems
-Lenses
- Fixed focal length
- Panoramic
- Special-purpose
- Varifocal
- Zoom (motorised)
-Point-of-sale (POS) systems
-Service centres (for CCTV equipment)
-Thermal cameras
- Fixed
- Industrial use
- Long distance
- Portable
- PTZ
-Vehicle CCTV systems
-Video multiplexers
-Video recorders
- Digital video recorders (DVR)
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
-Video sequencers
News from V-Cam Security: |
V-Cam Standalone
April 2007, Surveillance, V-Cam Security
The new Standalone series from V-Cam Security was launched mid last year. Three different models came off the production line, namely the 4-, 8- and 16-channel Chateau Standalone models. The series boasts ... |
Security news: |
Almost 50% of companies choose to pay the ransom
Issue 3 2025, Information Security, News & Events
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years. |
Analyse, automate, and optimise logistics processes
Issue 3 2025, Surveillance, Transport (Industry), Products & Solutions, Logistics (Industry), neaMetrics
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity. |
Survey highlights cost of cyberdamage to industrial companies
Issue 3 2025, Information Security, News & Events, Kaspersky
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million. |
Gallagher Security achieves ISO 27001 recertification
Issue 3 2025, News & Events, Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security. |
Digital economy needs an agile approach to cybersecurity
Issue 3 2025, Information Security, News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks |
IQ Panels now supported by PowerManage
Issue 3 2025, Products & Solutions, Johnson Controls - (Tyco Security Products)
IQ Panels, now supported by PowerManage, simplify installation and data management. The PowerManage interactive platform allows for localised data storage, so customer information is not stored in the cloud or exposed to a third party. |
Value and industry insight
Issue 3 2025, News & Events, Training & Education, Securex South Africa
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing. |
SIEM rule threat coverage validation
Issue 3 2025, Information Security, News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections. |
visit www.securitysa.com |
|
|
|
|
|