|
|
Technocentric Security
Unit 35, Graphite Industrial Park, 1 Fabriek St, Strijdom Park
Core business offering: Technocentric Security provides installation and maintenance of quality electronic security products. Its expertise includes access control, IP CCTV systems, wireless communication, fibre optics, electric fencing, digital intercoms, intrusion detection, smoke detection and physical access barriers. The company can integrate these disciplines to offer a customised security solution.
|
Section - Service providers
-Control rooms
- Design & construction
- Management
-Services offered
- Alarm monitoring
- Video analytics
- Video management
- Video monitoring
-Counter-intelligence consulting
-Risk assessments/audits
-Backup & recovery
-Control room design
-Engineering, project management
-Monitoring services
-Video analytics
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Cloud-based/hosted systems
- ID badge & card services
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Visitor management systems
- Visitor tracking systems
- Workforce management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Evacuation systems
- Network communications
- Radio, 2-way & paging systems
- Video/audio intercom systems
- Wireless (incl. cellular)
-Fire alarm systems
- Fire detection & early warning systems
- Fire suppression
-Locks and safes
- Electronic locks
- Mechanical locks
-Perimeter security
- Electric fencing
- Gate & door automation
- Intruder detection (exterior)
- Non-electric fencing
- Parking barriers
- Vehicle detection
-Surveillance systems
- Covert surveillance
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
- Video management systems
| News from Technocentric Security: |
Fernridge Estate upgrades to IP
Residential Estate Security Handbook 2016 - Vol 1, Surveillance, Residential Estate (Industry), Technocentric Security
Ringmaster Security recently completed a security upgrade for Fernridge Estate, improving, upgrading and expanding the existing security installation. |
Ringmaster Security
CCTV Handbook 2017, Surveillance, Integrated Solutions, Technocentric Security
Established in 2010 by Vince Botha (MD), his sons Jason and Dale, and Robert Kgatle, Ringmaster Security provides integrated electronic, risk, safety and security solutions to medium and large enterprises. ... |
Security news: |
PoPIA turns its attention to gated access
May 2026, News & Events, Security Services & Risk Management
The Information Regulator has gazetted its proposed Code of Conduct for the processing of personal information at gated access points. At 65 pages long, the code signals a significant shift in how personal information is collected and managed at entry points. |
Employees are SA’s biggest cyber threat
May 2026, Information Security, Security Services & Risk Management
South Africa experienced a 46% increase in insider cyber risk in 2026, surpassing the global average of 44%. What is more, 63% of South African companies surveyed expect insider-driven data losses to increase. |
The post-Q1 security checklist
May 2026, Asset Management, Security Services & Risk Management
By this time of year, employees have changed jobs or roles, suppliers may have changed, and devices have moved between offices, homes, and sites. This is the right time for businesses to run a practical post-Q1 security check. |
Aerial firefighter training revolution
May 2026, Fire & Safety, News & Events
Sophisticated new flight simulation software capable of accurately modelling the performance of firefighting helicopters could help train pilots to tackle wildfires more effectively and safely in the future. |
Key attributes of an effective cybersecurity leader
May 2026, Information Security, BlueVision
In an evolving technology landscape, an effective cyber leader must combine technical acumen, foresight, and adaptive leadership to mitigate risks, and risks can only be mitigated once accurately identified and remedial processes are in place. |
Tackling enterprise security ‘tool sprawl’
May 2026, Information Security, NEC XON
South African ICT solutions provider NEC XON is advocating a shift away from fragmented cybersecurity toolsets towards unified platforms, arguing that ‘tool sprawl’ is undermining the effectiveness of enterprise security operations. |
Surge in AI-enabled cybercrime and a 389% increase in ransomware
May 2026, Information Security, News & Events
Cybercrime no longer functions as a series of isolated campaigns; it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow agents. |
| visit www.securitysa.com |
|
|
|
|
|