-
Hi-Tech Security Business Directory (HSBD)
RBH Access Technologies

Byls Bridge Office Park G, cnr Olievenhoutbosch & Jean Avenues, Centurion

cell:  
+27 83 329 7574
email:  
[email protected]
url:  
www.rbh-access.com

Iso Certification 9001:2015

Core business offering: RBH Access is an internationally acclaimed access control system of choice, sold in more than 125 countries worldwide.


Rakhale, Teboho
Regional Manager
[email protected]
Riarh, Kanty
Manager Canada
[email protected]
Ortera Solutions
Johannesburg
tel: +27 83 329 7574
AxiomXa
(Manufacturer)
Integra32
(Manufacturer)
RBHView
(Manufacturer)
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Barcode
- Dual/multi technology
- Magnetic stripe
- Proximity
- RFID
- Smartcard
-Control systems
- Card coding/deletion/programming
- Card/keypad combination
- Control reports
- Integrated building management
- Lift/elevator control software
- Multi-alarm capability
- Multi-building
- Parking management/control software
- Remote monitored/hosted
- Storage/backup control software
- Time & attendance integration
-Facial recognition
-Fingerprint analysis
-Hand geometry
-Iris recognition
-Palm analysis
-Retinal scan
-Vein analysis
-Voice pattern analysis
-Delayed egress systems
-Door entry systems
-Exit systems
- Electronic
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Card/PIN
- Pushbutton
-Visitor management systems
- Cloud-based
-Visitor management/tracking systems
-ID card systems
-ID cards
-Identity management policies
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Central station & remote monitoring equipment
- Audio equipment
- Digital communicating equipment
- Remote controls with zone annunciation
- Remote light controls
- Remote release
- Reporting equipment
- RF telemetry equipment
- Video verification equipment
-Control panels
- Arm/disarm stations
- Graphic panels (icons)
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Battery backup
Section - Asset management
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Building management
-Building information software
-Building management
-Lighting & electrical
-Software development & integration
-Sustainability solutions
Section - Physical security - locks, safes & containers
-Key tags, identification & accountability systems
Section - Service providers
-Institutes & associations
-Psychological testing
-Risk assessments/audits
-Security assessment & policy
-Communications
-Engineering
-Risk assessments
-Safety audits
-Security in general
-Technical focus
- Access control
- Asset management, EAS, RFID
- CCTV, surveillance
- Control room design & management
- Cyber & Information security
- Enterprise solutions
- Fire & safety
- Identity management
- Perimeter security, alarms & intruder detection
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Cloud-based/hosted systems
- ID badge & card services
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Smartcard systems
- Visitor management systems
- Visitor tracking systems
- Workforce management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - industrial/commercial
-Communications systems
- Evacuation systems
- Network communications
-IT, network and data centre infrastructure
-Surveillance systems
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
- Video management systems
-Vehicle security systems
- Parking control systems
-Access control
-Alarms, intrusion, perimeter
-CCTV/surveillance
-Management/supervisor skills
-Remote monitoring operator training
-Security management
-Software installation/configuration training
Section - Surveillance equipment
-Physical security info management platforms (PSIM)
-Video analytics
- AI-enhanced analytics
- On-camera
- Remote/cloud-based
- Server-based
-Video management systems (VMS)
-Video recorders
- Cloud-based video storage
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
Security news:
Eight African cybersecurity trends for 2026
January 2026, Information Security

Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Seeing is no longer believing
January 2026, Security Services & Risk Management

Fraud has shifted. It is no longer just about financial theft; it is about identity theft in the most visceral sense. The most effective control is often completely non-technical: the ‘pause and verify’ rule.

Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
January 2026, Information Security, Asset Management, Industrial (Industry)

Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Reshaping South Africa’s built environment
January 2026, News & Events, Commercial (Industry), Facilities & Building Management, Securex South Africa

FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Top five AIoT trends in 2026
January 2026, AI & Data Analytics, IoT & Automation

As we enter 2026, the convergence of artificial intelligence (AI) and IoT infrastructure is reshaping industries, unlocking unprecedented opportunities to optimise operations, enhance security, and improve sustainability.

The IoT is a criminal’s worst nightmare
January 2026, IoT & Automation

For South Africans who want to stay here and build a better country for our kids, grandkids, friends, and others, the Internet of Things gets us really excited because it enables ‘edge processing’.

Integrated security key to protecting cloud applications
January 2026, Information Security, Infrastructure

Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
January 2026, Information Security, News & Events, Videos, SMART Security Solutions

SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.