-
Hi-Tech Security Business Directory (HSBD)
Ushaka Projects

Prism Business Park, 1 Ruby Close , Witkoppen, Sandton

tel:  
+27 83 783 7310
email:  
[email protected]

Core business offering: Specialists in installation of electronic access control, vehicle barriers and turnstiles, CCTV and fire detection systems. Building Management systems installed for management and control of lighting and HVAC on site. Based in Johannesburg but operating nationally.


Cape Town

tel: +27 83 783 7310
[email protected]
Durban

tel: +27 83 783 7310
[email protected]
Roos, Robin
Business Development Manager
[email protected]
Section - Access control & identity management
-Card technology
- Dual/multi technology
- Magnetic stripe
- Proximity
- RFID
-Control systems
- Card/keypad combination
- Integrated building management
- Lift/elevator control software
- Parking management/control software
- Time & attendance integration
-Digital/computer access control solutions
-Facial recognition
-Fingerprint analysis
-Hand geometry
-Iris recognition
-Palm analysis
-Retinal scan
-Vein analysis
-Voice pattern analysis
-Door entry systems
-Electrically-powered door operators
-Electronic locking systems
-Exit systems
- Electronic
-Fire doors
-Portals (mantraps)
-Revolving doors
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Card/PIN
- Programmable
- Pushbutton
-Visitor management/tracking systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Audio equipment
- Remote controls with zone annunciation
- Reporting equipment
- Video verification equipment
-Control panels
- Arm/disarm stations
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Batteries
- Battery backup
- Battery testers/analysers
- Cabinets & racks
- Installation materials
-Power or environment sensors
- AC & UPS power failure protection
- Fire
- Surge protection devices
-Radio communications
- Base stations
- Transmitters
-Remote monitoring
- GSM/cellular
-Dual technology detectors
-Infrared, passive (PIR)
-Loop detectors
-Motion detectors
-Photoelectric beam
-Proximity sensors
-Seismic sensors, buried
-Vibration sensors
-Beam protectors
-Contacts, door & window switches
-Continuity loops
- Door loops
-Frequency-tuned sensors
- Shock sensors
-Seismic sensors
-Vault alarm
-Vibration/shock detectors
Section - Asset management
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Fire protection products & systems
-Alarm boxes, fire
-Arrestors
- Flame
- Lightning, surge
- Spark
-Audible indicators
-Audio-visual indicators
-Bells - 24 V d.c.
-Cabinets
- Fire alarm
-Cables & wires
- Fire resistant
- Insulation materials
-Communications equipment
-Control panels
- Analogue addressable
- Conventional
- IP
- Mimic
-Detectors, air sampling/early warning
-Detectors, duct
-Detectors, fire
- Beam
- Gas (CO)
- Heat sensors
- Intrinsically safe
- Multisensor technology
- Optical
- Temperature
-Detectors, smoke
- Beam
- Early warning/air sampling
- Ionisation (smoke)
- Photoelectric
-Electronic sounders
-Evacuation systems
-Panic devices
-Sprinkler, sprinkler monitoring systems
-Strobe lights
Section - IoT/IT security infrastructure
-Cables & fibres
-Enclosures, racks & consoles
- Cabinets - free-standing
- Cabinets - wall mounted
- Consoles - workstations, desk
- Racks & sub-racks
-Installation accessories
-Consoles - workstations, desk
-Network hardware
-Network management s/w
-Routers & switches
-Wireless networking
-Wireless security solutions
-Network video recorders (NVR)
-Optical drives
-RAID controllers/adaptors
-SAN/NAS
-Storage management
- Backup/recovery
Section - Other security equipment
-Parking control systems, integrated
-Vehicle counting systems
Section - Perimeter security
-Barriers, vehicle
- Bollards
-Fences, electric
- Controllers, electric fence
- Insulators, electric fence
-Perimeter intrusion detection systems (PIDS)
-Turnstiles
- Full height
- Mechanical
-Combination of lenses
-Infrared
-Thermal
-Visual light camera
Section - Service providers
-Control room design
-Video analytics
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Smartcard systems
- Visitor management systems
- Visitor tracking systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
-Alarm Systems
- Video detection and/or verification
-Alarm systems
- Wireless
-Communications systems
- Evacuation systems
- Radio, 2-way & paging systems
- Video/audio intercom systems
-Fire alarm systems
- Fire detection & early warning systems
-Perimeter security
- Electric fencing
- Intruder detection (exterior)
-Surveillance systems
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
-Vehicle security systems
- Parking control systems
-Agriculture
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Government & parastatal
-Healthcare
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
Section - Surveillance equipment
-Anti-theft devices
-Consoles/enclosures for CCTV systems
-Housings, camera
- Domes/spheres/hemispheres
- Dust-proof
- Ergonomic (indoor)
- Explosion-proof
- Extreme environmental
- Heater/defroster kits
- High-temperature
- Integrated low-light enhancement
- Pressurised
- Radiation proof
- Special-purpose
- Vandal-proof
- Washer & wiper units
- Weather-proof
-Video monitors
-Video multiplexers
-Cables
-Camera test targets
-Connectors
-Enclosures
-Mounting brackets, accessories
-Physical security info management platforms (PSIM)
-Security information and event management (SIEM) platforms
-Video analytics
- AI-enhanced analytics
- Server-based
-Video management systems (VMS)
Security news:
Super election year increases risks of political violence
April 2024, Editor's Choice

Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice

Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

2024 State of Security Report
April 2024, Editor's Choice

Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice

Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Cyberthreats facing SMBs
April 2024, Editor's Choice

Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Are we our own worst enemy?
April 2024, Editor's Choice

Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Protecting IP and secret data in the age of AI
April 2024, Editor's Choice

The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security

Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.