-
Hi-Tech Security Business Directory (HSBD)
AVeS Cyber Security

Unit 10, Argyle Office Park, 10 Tamarisk Avenue, Weltevreden Park Ext 83

tel:  
+27 86 100 2837
email:  
info@aves.co.za
url:  
aves.co.za

Core business offering: AVeS Cyber Security is an IT governance and architectural services consultancy that helps businesses of all sizes gain confidence in their digital information. We combine expert knowledge and services with leading technology products to provide comprehensive information security, and advanced IT infrastructure solutions.


Cape Town

tel: +27 86 100 2837
info@aves.co.za
Barracuda Networks
(Installer)
Check Point Software Technologies
(Installer)
Dell EMC
(Installer)
ESET
(Installer)
Fortinet
(Installer)
IP-Guard
(Sub Agency, Installer)
Kaspersky Lab
(Installer)
McAfee Incorporated
(Installer)
Microsoft
(Installer)
Mimecast
(Sub Agency)
Solar Winds
(Installer)
SonicWALL
(Installer)
Sophos Group
(Installer)
Symantec
(Installer)
Trustwave Holdings
(Installer)
Veeam Software
(Installer)
Veritas Technologies
(Installer)
VMware
(Installer)
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Magnetic stripe
- RFID
- Touch memory (Dallas iButton)
-Control systems
- Card/keypad combination
- Multi-alarm capability
- Remote monitored
- Storage/backup control software
- Time & attendance integration
-Fingerprint analysis
-Electronic locks & accessories
-Intercom systems
- Video
- Voice
-Portals
- Biometric
- Card/PIN
- Pushbutton
-Identity management policies
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Remote controls with zone annunciation
- Remote light controls
-Control panels
- Arm/disarm stations
- IP/network
- Wireless
-Miscellaneous alarm equipment
- Batteries
- Cabinets & racks
- Installation materials
-Power or environment sensors
- AC & UPS power failure protection
- Surge protection devices
- Water presence/level
-Infrared beams, active
-Infrared, passive (PIR)
-Motion detectors
-Beams (see motion detectors)
-Contacts, door & window switches
-Emergency switches
-Motion detectors
- Infrared, passive
-Panic buttons
-Window grilles, alarms & shutters
Section - CCTV & surveillance equipment
-Lighting
- Infrared
- Security
-Mounting brackets, accessories
-Transmission systems for CCTV
- LAN (Ethernet, LonWorks)
Section - IT infrastructure for security
-Cables & fibres
- Computer
- Twisted pair
-Enclosures, racks & consoles
- Cabinets - free-standing
- Cabinets - wall mounted
-Access control
- Biometric systems
-Computers & accessories
-Data encryption equipment
-Enclosures
- Locks CPU & power switch
-Network security appliance
-Other components
-Other peripherals
-PC/notebook locking systems
-Physical asset tagging
-Secure IoT devices
-Secure storage media
- Hard drive
-Tracking & recovery solutions
-Unified threat management hardware
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Encryption s/w
-Firewalls
-Governance & compliance s/w
-Identification systems
-IoT/Edge security s/w
-Network security s/w
-Password protection s/w
-PC/laptop/server security s/w
-Remote/hosted security s/w & services
-Risk management s/w
-Secure communication solutions
-Security info & event management platforms (SIEM)
-Security management platforms
-Data centre equipment
-Racks & enclosures
-Surge protection & power conditioning
-UPS systems
-Service providers
- Managed Service Provider (MSP)
- Network service providers
- Platform as a Service
- Software as a Service
- Storage as a Service
-Authentication & identity verification systems
- Access control solutions
- Biometrics
- Password management solutions
-Certificate authority/certification services
-Data privacy tools
-Encryption & key management tools & solutions
-Identity management/user provisioning
-Mobile security
-Network security
-Policy managers
-Usage management & monitoring
-Vulnerability assessments & penetration testing
-Wireless security
-BYOD solutions
-Communication security solutions
-Consoles - workstations, desk
-Network hardware
-Network management s/w
-Network optimisation
-Network security appliance
-Network security solutions
-Other networking equipment
-Portable wireless networking equipment
-Racks & sub-racks
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
-LAN/WAN solutions
-Network management solutions
-Remote access technologies
-Routers
-Switches
-Wireless technologies & mobile computing
- Routers
- Switches
-E-mail archiving solutions
-Storage management
- Backup/recovery
- Clustering
- Security
- Storage management
Section - Other security equipment
-Covert surveillance equipment
Section - Physical security - locks, safes & containers
-Keypads
-Touchpads
Section - Service providers
-Geographical area served
- International
- National
- Regional
-Services offered
- Information/cybersecurity services
-Counter-intelligence consulting
-Disaster recovery services
-Fraud prevention services
-Risk assessments
-Security assessment & policy
-Risk assessments
-Technical focus
- Access control
- Identity management
- Information security
- Perimeter security, alarms & intruder detection
-Agriculture
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Government & parastatal
-Healthcare
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
-Access Control as a Service (ACaaS)
-Backup & recovery
-Business continuity services
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
- Remote/offsite monitoring
-Security as a Service
-Access control systems
- Access control systems
- Asset management systems
- Biometric systems
- Cloud-based/hosted systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - industrial/commercial
- Wireless
-Information security
- Cybersecurity monitoring systems
- Cybersecurity protection systems
- User monitoring solutions
-IT, network and data centre infrastructure
-Locks and safes
- Electronic locks
-Perimeter security
- Intruder detection (exterior)
-Surveillance systems
- CCTV, IP CCTV
-Agriculture
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Government & parastatal
-Healthcare
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
-Access control
-Alarms, intrusion, perimeter
-CCTV/surveillance
-Eavesdropping countermeasures
-Fraud detection, prevention, investigation
-Information/cybersecurity
-Lighting
-Networking technology
-Risk management
-Security management
-Software installation/configuration training
News from AVeS Cyber Security:
Integrated risk management essential
August 2019, IT infrastructure, Security Services & Risk Management, Industrial (Industry), AVeS Cyber Security

With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is highly vulnerable to cyberattacks.

Integration is communication
February 2019, Cyber Security, Integrated Solutions, AVeS Cyber Security

Communication is the missing link for integrating physical and IT security resources, says Charl Ueckermann, CEO at AVeS Cyber Security.

The risks of social media
November 2018, Cyber Security, AVeS Cyber Security

Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.

Securing edge devices and the data they contain
October 2018, Cyber Security, IT infrastructure, Editor's Choice, AVeS Cyber Security

Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.

Cyber-securing physical security
March 2018, Cyber Security, Editor's Choice, AVeS Cyber Security

You can’t kick a rock these days without hearing about cybersecurity and the Internet of Things (IoT). At the same time, you should not be talking, reading or hearing about one of these without the other.

Security news:
TAPA conference 2019 explores layered approach to security
September 2019, News, Transport (Industry), Technews Publishing, TAPA (Transported Asset Protection Association)

The Transported Asset Protection Association (TAPA) held its annual South African conference at Emperors Palace in Johannesburg on 26 July 2019.

New Africa sales manager for Axis Communications
September 2019, CCTV, Surveillance & Remote Monitoring, News, Axis Communications SA

Axis Communications has appointed Brendon Hall, previously the founder and MD of Pentagon, as its new sales manager, Africa.

ViRDI UBio Tab 5
September 2019, Access Control & Identity Management, Products

ViRDI Distribution SA (ViRDI Africa) has announced the release of its long-awaited UBio Tablet to the South African market.

Hikvision helps secure African Union Summit
September 2019, CCTV, Surveillance & Remote Monitoring, News, Hikvision South Africa

Hikvision established a complete intelligent video solution to ensure the security of the thirty-third African Union (AU) Summit held on 7 July in Niamey, the capital of Niger.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.