|
Nology
Unit 4 Louwlardia Business Park, 122 Bavaria Road, Centurion
Core business offering: Nology provides its resellers with a range of value-added services that assist them in choosing, deploying and supporting the products they buy from the company. Find out more about its services and how they can benefit your business. Nology offers a wide range of industry-leading broadband connectivity, networking, wireless and VoIP products and solutions.
|
Centurion
|
Cape Town
tel: +27 21 551 2126
fax: +27 86 554 3195
|
Matrix Warehouse |
Johannesburg
tel: +27 11 869 2613
|
Platinum Micro |
Johannesburg
tel: +27 11 553 2600
fax: +27 11 553 2700
|
Section - Access control & identity management
-Visitor management systems
- Cloud-based
-Visitor management/tracking systems
Section - Building management
-Infrastructure solutions
Section - Communications equipment
-Intercoms
- Standalone intercoms
-IP/network
-Routers/modems
-Secure telecommunications products
Section - IoT/IT security infrastructure
-Racks & enclosures
-Wiring & cabling solutions
-Communication security solutions
-Edge security solutions
-Network hardware
-Other networking equipment
-Routers & switches
-Wireless networking
-LAN/WAN solutions
-Routers
-Switches
-Wireless technologies & mobile computing
Section - Service providers
-Access control systems
- Visitor management systems
- Visitor tracking systems
News from Nology: |
IP intercoms for Al Erkyah City in Qatar
SMART Access & Identity 2024, Access Control & Identity Management, Nology
The project developers Al Erkyah City in Doha, Qatar, required an IP intercom system on par with the development’s elite standards to facilitate secure access control and streamline property management across the vast property. |
Smart intercoms for Sky House Projects
SMART Access & Identity 2024, Access Control & Identity Management, Residential Estate (Industry), Nology
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app. |
Security news: |
Super election year increases risks of political violence
April 2024, Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation. |
AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture. |
2024 State of Security Report
April 2024, Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time. |
How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities. |
Cyberthreats facing SMBs
April 2024, Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.
|
Are we our own worst enemy?
April 2024, Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa. |
Protecting IP and secret data in the age of AI
April 2024, Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data. |
visit www.securitysa.com |
|
|
|
|
|