|
Amaya Industries
Alrode Mulitpark, JG Strijdom Road, Alrode, Alberton
Iso Certification ISO 9001
Core business offering: Amaya Industries supplies, upgrades and maintains electronic key management systems, electronic lockers and intelligent keys with state-of-the-art electronic cylinders and padlocks.
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
Ecos Systems
(Sole Agency) |
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Proximity
-Control systems
- Remote monitored/hosted
- Time & attendance integration
Section - Other security equipment
-Drug testing equipment
- Alcohol screening/breath analysers
Section - Physical security - locks, safes & containers
-Key control equipment
-Key safes
-Key storage cabinets
-Key tags, identification & accountability systems
-Key tracking systems
News from Amaya Industries: |
The key to security
Access & Identity Management Handbook 2015, Access Control & Identity Management, Amaya Industries, Traka Africa
Hi-Tech Security Solutions spoke to a number of key management companies to find out the latest in this quiet, but critical field. |
Key management in the spotlight
July 2015, Access Control & Identity Management, Infrastructure, Traka Africa, Amaya Industries
Key management today is no longer a case of having your secretary keep the keys in her desk drawer and only hand it out to people she considers acceptable. It has become a science. |
Security news: |
A passport to offline backups
Issue 2 2025, Infrastructure, Editor's Choice, Smart Home Automation, SMART Security Solutions, Technews Publishing
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device. |
A guide to HMI and OT protection
Issue 2 2025, IoT & Automation
“Human machine interfaces (HMIs) in industrial environments are critical for operational oversight, but their web-based nature can make them a target for cyberthreats,” says Andre Froneman, OT solutions specialist at Datacentrix. |
ESPRIT intelligent fire panel range
Issue 2 2025, Fire & Safety, Products & Solutions, Technoswitch Fire Detection & Suppression
Technoswitch recently added the EN54-approved ESPRIT intelligent control panel range to its product portfolio to complement the existing TC5000 intelligent control panel range, aimed at small and medium sites that require a cost-effective, networkable fire alarm system. |
Local innovation driving excellence in FM
Issue 2 2025, News & Events, Securex South Africa
As organisations seek cost-effective, sustainable, and high-quality solutions, home-grown facilities management innovation is proving to be a critical driver of operational efficiency and long-term success. |
AI and privacy to shape consumer cybersecurity landscape
Issue 2 2025, AI & Data Analytics
A report from Kaspersky indicates that artificial intelligence will become an integral part of daily life in 2025, while privacy concerns around biometric data and advanced technologies will take centre stage. |
T&A in South Africa’s retail sector
Issue 2 2025, Access Control & Identity Management, ERS Biometrics
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes. |
Cyber recovery requires a different approach to disaster recovery
Issue 2 2025, Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage. |
visit www.securitysa.com |
|
|
|
|
|