-
Hi-Tech Security Business Directory (HSBD)
AVeS Cyber Security

Unit 10, Argyle Office Park, 10 Tamarisk Avenue, Weltevreden Park Ext 83

tel:  
+27 86 100 2837
email:  
info@aves.co.za
url:  
aves.co.za

Core business offering: AVeS Cyber Security is an IT governance and architectural services consultancy that helps businesses of all sizes gain confidence in their digital information. We combine expert knowledge and services with leading technology products to provide comprehensive information security, and advanced IT infrastructure solutions.


Cape Town

tel: +27 86 100 2837
info@aves.co.za
Barracuda Networks
(Installer)
Check Point Software Technologies
(Installer)
Dell EMC
(Installer)
ESET
(Installer)
Fortinet
(Installer)
IP-Guard
(Sub Agency, Installer)
Kaspersky Lab
(Installer)
McAfee Incorporated
(Installer)
Microsoft
(Installer)
Mimecast
(Sub Agency)
Solar Winds
(Installer)
SonicWALL
(Installer)
Sophos Group
(Installer)
Symantec
(Installer)
Trustwave Holdings
(Installer)
Veeam Software
(Installer)
Veritas Technologies
(Installer)
VMware
(Installer)
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Magnetic stripe
- RFID
- Touch memory (Dallas iButton)
-Control systems
- Card/keypad combination
- Multi-alarm capability
- Remote monitored
- Storage/backup control software
- Time & attendance integration
-Fingerprint analysis
-Electronic locks & accessories
-Intercom systems
- Video
- Voice
-Portals
- Biometric
- Card/PIN
- Pushbutton
-Identity management policies
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Remote controls with zone annunciation
- Remote light controls
-Control panels
- Arm/disarm stations
- IP/network
- Wireless
-Miscellaneous alarm equipment
- Batteries
- Cabinets & racks
- Installation materials
-Power or environment sensors
- AC & UPS power failure protection
- Surge protection devices
- Water presence/level
-Infrared beams, active
-Infrared, passive (PIR)
-Motion detectors
-Beams (see motion detectors)
-Contacts, door & window switches
-Emergency switches
-Motion detectors
- Infrared, passive
-Panic buttons
-Window grilles, alarms & shutters
Section - CCTV & surveillance equipment
-Lighting
- Infrared
- Security
-Mounting brackets, accessories
-Transmission systems for CCTV
- LAN (Ethernet, LonWorks)
Section - IT infrastructure for security
-Cables & fibres
- Computer
- Twisted pair
-Enclosures, racks & consoles
- Cabinets - free-standing
- Cabinets - wall mounted
-Access control
- Biometric systems
-Computers & accessories
-Data encryption equipment
-Enclosures
- Locks CPU & power switch
-Network security appliance
-Other components
-Other peripherals
-PC/notebook locking systems
-Physical asset tagging
-Secure IoT devices
-Secure storage media
- Hard drive
-Tracking & recovery solutions
-Unified threat management hardware
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Encryption s/w
-Firewalls
-Governance & compliance s/w
-Identification systems
-IoT/Edge security s/w
-Network security s/w
-Password protection s/w
-PC/laptop/server security s/w
-Remote/hosted security s/w & services
-Risk management s/w
-Secure communication solutions
-Security info & event management platforms (SIEM)
-Security management platforms
-Data centre equipment
-Racks & enclosures
-Surge protection & power conditioning
-UPS systems
-Service providers
- Managed Service Provider (MSP)
- Network service providers
- Platform as a Service
- Software as a Service
- Storage as a Service
-Authentication & identity verification systems
- Access control solutions
- Biometrics
- Password management solutions
-Certificate authority/certification services
-Data privacy tools
-Encryption & key management tools & solutions
-Identity management/user provisioning
-Mobile security
-Network security
-Policy managers
-Usage management & monitoring
-Vulnerability assessments & penetration testing
-Wireless security
-BYOD solutions
-Communication security solutions
-Consoles - workstations, desk
-Network hardware
-Network management s/w
-Network optimisation
-Network security appliance
-Network security solutions
-Other networking equipment
-Portable wireless networking equipment
-Racks & sub-racks
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
-LAN/WAN solutions
-Network management solutions
-Remote access technologies
-Routers
-Switches
-Wireless technologies & mobile computing
- Routers
- Switches
-E-mail archiving solutions
-Storage management
- Backup/recovery
- Clustering
- Security
- Storage management
Section - Other security equipment
-Covert surveillance equipment
Section - Physical security - locks, safes & containers
-Keypads
-Touchpads
Section - Service providers
-Geographical area served
- International
- National
- Regional
-Services offered
- Information/cybersecurity services
-Counter-intelligence consulting
-Disaster recovery services
-Fraud prevention services
-Risk assessments
-Security assessment & policy
-Risk assessments
-Technical focus
- Access control
- Identity management
- Information security
- Perimeter security, alarms & intruder detection
-Agriculture
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Government & parastatal
-Healthcare
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
-Access Control as a Service (ACaaS)
-Backup & recovery
-Business continuity services
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
- Remote/offsite monitoring
-Security as a Service
-Access control systems
- Access control systems
- Asset management systems
- Biometric systems
- Cloud-based/hosted systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - industrial/commercial
- Wireless
-Information security
- Cybersecurity monitoring systems
- Cybersecurity protection systems
- User monitoring solutions
-IT, network and data centre infrastructure
-Locks and safes
- Electronic locks
-Perimeter security
- Intruder detection (exterior)
-Surveillance systems
- CCTV, IP CCTV
-Agriculture
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Government & parastatal
-Healthcare
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
-Access control
-Alarms, intrusion, perimeter
-CCTV/surveillance
-Eavesdropping countermeasures
-Fraud detection, prevention, investigation
-Information/cybersecurity
-Lighting
-Networking technology
-Risk management
-Security management
-Software installation/configuration training
News from AVeS Cyber Security:
Integration is communication
February 2019, Cyber Security, Integrated Solutions, AVeS Cyber Security

Communication is the missing link for integrating physical and IT security resources, says Charl Ueckermann, CEO at AVeS Cyber Security.

The risks of social media
November 2018, Cyber Security, AVeS Cyber Security

Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.

Securing edge devices and the data they contain
October 2018, Cyber Security, IT infrastructure, Editor's Choice, AVeS Cyber Security

Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.

Cyber-securing physical security
March 2018, Cyber Security, Editor's Choice, AVeS Cyber Security

You can’t kick a rock these days without hearing about cybersecurity and the Internet of Things (IoT). At the same time, you should not be talking, reading or hearing about one of these without the other.

Security news:
Unintended consequences of ­technology
June 2019, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Leaderware

The development of general AI capabilities has seen an accompanying concern among some of the key players in the IT space as well as academics internationally.

Optimising deep learning for visual surveillance
June 2019, CCTV, Surveillance & Remote Monitoring

Organisations are demanding solutions that can effectively and accurately harness visual data to help improve their security, safety, and operational effectiveness.

SIM swap fraud expands
June 2019, Cyber Security, News, Financial (Industry)

A new wave of attacks targeting financial services and online services have become very common in South Africa and the wider region.

AI serving border security
June 2019, Access Control & Identity Management, IDEMIA

Recent border security improvements, including use of cutting-edge biometric technology, ensures everyone who enters and leaves a country is safely identified.

Securex 2019 video
June 2019, News, Conferences & Events, Videos, Securex South Africa

Securex 2019 is now behind us, and the organisers have made a video available, taken on the third day of the exhibition, highlighting all that was happening at the show. As can be seen, the visitors were ...

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.