|
RBH Access Technologies
Byls Bridge Office Park G, cnr Olievenhoutbosch & Jean Avenues, Centurion
Iso Certification 9001:2015
Core business offering: RBH Access is an internationally acclaimed access control system of choice sold in more than 125 countries worldwide.
|
Flash Distribution |
Johannesburg
tel: +27 83 329 7574
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
Axiom
(Manufacturer) |
Integra32
(Manufacturer) |
RBHView
(Manufacturer) |
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Barcode
- Dual/multi technology
- Magnetic stripe
- Proximity
- RFID
- Smartcard
-Control systems
- Card coding/deletion/programming
- Card/keypad combination
- Control reports
- Integrated building management
- Lift/elevator control software
- Multi-alarm capability
- Multi-building
- Parking management/control software
- Remote monitored/hosted
- Storage/backup control software
- Time & attendance integration
-Facial recognition
-Fingerprint analysis
-Hand geometry
-Iris recognition
-Palm analysis
-Retinal scan
-Vein analysis
-Voice pattern analysis
-Delayed egress systems
-Door entry systems
-Exit systems
- Electronic
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Card/PIN
- Pushbutton
-Visitor management systems
- Cloud-based
-Visitor management/tracking systems
-ID card systems
-ID cards
-Identity management policies
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Central station & remote monitoring equipment
- Audio equipment
- Digital communicating equipment
- Remote controls with zone annunciation
- Remote light controls
- Remote release
- Reporting equipment
- RF telemetry equipment
- Video verification equipment
-Control panels
- Arm/disarm stations
- Graphic panels (icons)
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Battery backup
Section - Asset management
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Building management
-Building information software
-Building management
-Lighting & electrical
-Software development & integration
-Sustainability solutions
Section - Physical security - locks, safes & containers
-Key tags, identification & accountability systems
Section - Service providers
-Institutes & associations
-Psychological testing
-Risk assessments/audits
-Security assessment & policy
-Communications
-Engineering
-Risk assessments
-Safety audits
-Security in general
-Technical focus
- Access control
- Asset management, EAS, RFID
- CCTV, surveillance
- Control room design & management
- Cyber & Information security
- Enterprise solutions
- Fire & safety
- Identity management
- Perimeter security, alarms & intruder detection
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Cloud-based/hosted systems
- ID badge & card services
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Smartcard systems
- Visitor management systems
- Visitor tracking systems
- Workforce management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - industrial/commercial
-Communications systems
- Evacuation systems
- Network communications
-IT, network and data centre infrastructure
-Surveillance systems
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
- Video management systems
-Vehicle security systems
- Parking control systems
-Access control
-Alarms, intrusion, perimeter
-CCTV/surveillance
-Management/supervisor skills
-Remote monitoring operator training
-Security management
-Software installation/configuration training
Section - Surveillance equipment
-Physical security info management platforms (PSIM)
-Video analytics
- AI-enhanced analytics
- On-camera
- Remote/cloud-based
- Server-based
-Video management systems (VMS)
-Video recorders
- Cloud-based video storage
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
Security news: |
Blue Security ranked best reaction team in KZN
Issue 4 and 5 2025, News & Events, Commercial (Industry)
Blue Security has been ranked the Best Reaction Team in KwaZulu-Natal following its outstanding performance at the SAIDSA Reaction Man Competition 2025, which took place on 25 September at the Ballito Defensive Sport Shooting Club. |
Why Securex matters more than ever
Issue 4 and 5 2025, Fire & Safety, News & Events, Facilities & Building Management, Securex South Africa
Visitors will observe the application of integrated security solutions, including AI-enhanced surveillance, cloud-based access control, cybersecurity tools, and perimeter protection within residential, commercial, logistics, and industrial environments |
Sophos launches advisory services to deliver proactive cybersecurity resilience
Issue 4 and 5 2025, Information Security, News & Events
Sophos has launched a suite of penetration testing and application security services, designed to identify gaps in organisations’ security programs, which is informed by Sophos X-Ops Threat Intelligence and delivered by world-class experts. |
SA’s private security industry receives multi-million USD investment
Issue 4 and 5 2025, News & Events, Security Services & Risk Management
South Africa's private security sector has attracted significant international attention, with the world’s largest tactical flashlight manufacturer, Nextorch, announcing a major investment in its local operations, Nextorch Africa. |
Kaspersky highlights biometric and signature risks
Issue 4 and 5 2025, Information Security, News & Events
AI has elevated phishing into a highly personalised threat. Large language models enable attackers to craft convincing emails, messages and websites that mimic legitimate sources, eliminating grammatical errors that once exposed scams. |
Keenfinity launches Radionix as new intrusion brand
Issue 4 and 5 2025, Perimeter Security, Alarms & Intruder Detection, News & Events
Keenfinity Group’s Intrusion & Access Business Unit has launched Radionix as its new brand for intrusion alarm systems, unlocking new potential and growth opportunities. |
Software security is a team sport
Issue 4 and 5 2025, Information Security, Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams. |
Local-first data security is South Africa's new digital fortress
Issue 4 and 5 2025, Information Security, Infrastructure
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security. |
visit www.securitysa.com |
|
|
|
|
|