-
Hi-Tech Security Business Directory (HSBD)
Technocentric Security

Unit 35, Graphite Industrial Park, 1 Fabriek St, Strijdom Park

tel:  
+27 11 476 3381
cell:  
+27 76 811 1171
email:  
[email protected]
url:  
www.technocentric.co.za

Core business offering: Technocentric Security provides installation and maintenance of quality electronic security products. Its expertise includes access control, IP CCTV systems, wireless communication, fibre optics, electric fencing, digital intercoms, intrusion detection, smoke detection and physical access barriers. The company can integrate these disciplines to offer a customised security solution.


Johannesburg

tel: +27 11 476 3381
[email protected]
Botha, Dale
Technical Manager
[email protected]
Botha, Jason
Managing Director
[email protected]
Botha, Vincent
CEO
[email protected]
Eloff, Chantel
Marketing
[email protected]
Nkosi, Mphile
Service Manager
[email protected]
Rozyn, Michelle
Financial Director
[email protected]
Advanced Electronics
(Installer)
Aiphone
(Installer)
Aritech
(Installer)
BFR Digital
(Installer)
BoomGate Systems
(Installer)
Bosch Security Systems
(Installer)
Centurion
(Installer)
Clearline
(Installer)
Hikvision
(Installer)
Howlo
(Installer)
IDEMIA
(Installer)
IDS
(Installer)
Impro Technologies
(Installer)
Kentec
(Installer)
Nemtek
(Installer)
Netgear
(Installer)
PIMA
(Installer)
Planet
(Installer)
Precision Telemetry
(Installer)
Samsung
(Installer)
Sherlotronics
(Installer)
Stafix
(Installer)
Technoswitch
(Installer)
Section - Service providers
-Control rooms
- Design & construction
- Management
-Services offered
- Alarm monitoring
- Video analytics
- Video management
- Video monitoring
-Counter-intelligence consulting
-Risk assessments/audits
-Backup & recovery
-Control room design
-Engineering, project management
-Monitoring services
-Video analytics
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Cloud-based/hosted systems
- ID badge & card services
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Visitor management systems
- Visitor tracking systems
- Workforce management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Evacuation systems
- Network communications
- Radio, 2-way & paging systems
- Video/audio intercom systems
- Wireless (incl. cellular)
-Fire alarm systems
- Fire detection & early warning systems
- Fire suppression
-Locks and safes
- Electronic locks
- Mechanical locks
-Perimeter security
- Electric fencing
- Gate & door automation
- Intruder detection (exterior)
- Non-electric fencing
- Parking barriers
- Vehicle detection
-Surveillance systems
- Covert surveillance
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
- Video management systems
News from Technocentric Security:
Fernridge Estate upgrades to IP
Residential Estate Security Handbook 2016 - Vol 1, Surveillance, Residential Estate (Industry), Technocentric Security

Ringmaster Security recently completed a security upgrade for Fernridge Estate, improving, upgrading and expanding the existing security installation.

Ringmaster Security
CCTV Handbook 2017, Surveillance, Integrated Solutions, Technocentric Security

Established in 2010 by Vince Botha (MD), his sons Jason and Dale, and Robert Kgatle, Ringmaster Security provides integrated electronic, risk, safety and security solutions to medium and large enterprises. ...

Security news:
Holding all the cards
SMART Access & Identity 2026, Access Control & Identity Management, neaMetrics, Suprema, SMART Security Solutions, Technews Publishing

After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Access as a Service is inevitable
SMART Access & Identity 2026, Access Control & Identity Management, Infrastructure, Technews Publishing, SMART Security Solutions, ATG Digital

When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

From surveillance to insight across Africa
SMART Access & Identity 2026, Surveillance, Access Control & Identity Management, Products & Solutions, neaMetrics, TRASSIR - neaMetrics Distribution

TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Making a mesh for security
SMART Access & Identity 2026, Information Security, Security Services & Risk Management

Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Directory of access and identity management suppliers 2025
SMART Access & Identity 2026, Access Control & Identity Management

The Directory of Access and Identity Management Suppliers 2026 includes the details of companies that provide products, advice and services to the access control and identity management market.

A clear vision for a safer, smarter future
February 2026, Perimeter Security, Alarms & Intruder Detection, News & Events, Smart Home Automation

With its authoritative lineup of sponsors and exhibitors, HomeSec Expo 2026 embodies an authoritative, yet pragmatic vision, for the security industry. It is a vision that recognises both the urgency of current threats and the excitement of technological innovation.

Securing your access hardware and software
SMART Access & Identity 2026, Access Control & Identity Management, Information Security, SMART Security Solutions, Technews Publishing, RBH Access Technologies

Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.