|
Ushaka Projects
Prism Business Park, 1 Ruby Close , Witkoppen, Sandton
Core business offering: Specialists in installation of electronic access control, vehicle barriers and turnstiles, CCTV and fire detection systems. Building Management systems installed for management and control of lighting and HVAC on site. Based in Johannesburg but operating nationally.
|
Section - Access control & identity management
-Card technology
- Dual/multi technology
- Magnetic stripe
- Proximity
- RFID
-Control systems
- Card/keypad combination
- Integrated building management
- Lift/elevator control software
- Parking management/control software
- Time & attendance integration
-Digital/computer access control solutions
-Facial recognition
-Fingerprint analysis
-Hand geometry
-Iris recognition
-Palm analysis
-Retinal scan
-Vein analysis
-Voice pattern analysis
-Door entry systems
-Electrically-powered door operators
-Electronic locking systems
-Exit systems
- Electronic
-Fire doors
-Portals (mantraps)
-Revolving doors
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Card/PIN
- Programmable
- Pushbutton
-Visitor management/tracking systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Audio equipment
- Remote controls with zone annunciation
- Reporting equipment
- Video verification equipment
-Control panels
- Arm/disarm stations
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Batteries
- Battery backup
- Battery testers/analysers
- Cabinets & racks
- Installation materials
-Power or environment sensors
- AC & UPS power failure protection
- Fire
- Surge protection devices
-Radio communications
- Base stations
- Transmitters
-Remote monitoring
- GSM/cellular
-Dual technology detectors
-Infrared, passive (PIR)
-Loop detectors
-Motion detectors
-Photoelectric beam
-Proximity sensors
-Seismic sensors, buried
-Vibration sensors
-Beam protectors
-Contacts, door & window switches
-Continuity loops
- Door loops
-Frequency-tuned sensors
- Shock sensors
-Seismic sensors
-Vault alarm
-Vibration/shock detectors
Section - Asset management
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Fire protection products & systems
-Alarm boxes, fire
-Arrestors
- Flame
- Lightning, surge
- Spark
-Audible indicators
-Audio-visual indicators
-Bells - 24 V d.c.
-Cabinets
- Fire alarm
-Cables & wires
- Fire resistant
- Insulation materials
-Communications equipment
-Control panels
- Analogue addressable
- Conventional
- IP
- Mimic
-Detectors, air sampling/early warning
-Detectors, duct
-Detectors, fire
- Beam
- Gas (CO)
- Heat sensors
- Intrinsically safe
- Multisensor technology
- Optical
- Temperature
-Detectors, smoke
- Beam
- Early warning/air sampling
- Ionisation (smoke)
- Photoelectric
-Electronic sounders
-Evacuation systems
-Panic devices
-Sprinkler, sprinkler monitoring systems
-Strobe lights
Section - IoT/IT security infrastructure
-Cables & fibres
-Enclosures, racks & consoles
- Cabinets - free-standing
- Cabinets - wall mounted
- Consoles - workstations, desk
- Racks & sub-racks
-Installation accessories
-Consoles - workstations, desk
-Network hardware
-Network management s/w
-Routers & switches
-Wireless networking
-Wireless security solutions
-Network video recorders (NVR)
-Optical drives
-RAID controllers/adaptors
-SAN/NAS
-Storage management
- Backup/recovery
Section - Other security equipment
-Parking control systems, integrated
-Vehicle counting systems
Section - Perimeter security
-Barriers, vehicle
- Bollards
-Fences, electric
- Controllers, electric fence
- Insulators, electric fence
-Perimeter intrusion detection systems (PIDS)
-Turnstiles
- Full height
- Mechanical
-Combination of lenses
-Infrared
-Thermal
-Visual light camera
Section - Service providers
-Control room design
-Video analytics
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Smartcard systems
- Visitor management systems
- Visitor tracking systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
-Alarm Systems
- Video detection and/or verification
-Alarm systems
- Wireless
-Communications systems
- Evacuation systems
- Radio, 2-way & paging systems
- Video/audio intercom systems
-Fire alarm systems
- Fire detection & early warning systems
-Perimeter security
- Electric fencing
- Intruder detection (exterior)
-Surveillance systems
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
-Vehicle security systems
- Parking control systems
-Agriculture
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Government & parastatal
-Healthcare
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
Section - Surveillance equipment
-Anti-theft devices
-Consoles/enclosures for CCTV systems
-Housings, camera
- Domes/spheres/hemispheres
- Dust-proof
- Ergonomic (indoor)
- Explosion-proof
- Extreme environmental
- Heater/defroster kits
- High-temperature
- Integrated low-light enhancement
- Pressurised
- Radiation proof
- Special-purpose
- Vandal-proof
- Washer & wiper units
- Weather-proof
-Video monitors
-Video multiplexers
-Cables
-Camera test targets
-Connectors
-Enclosures
-Mounting brackets, accessories
-Physical security info management platforms (PSIM)
-Security information and event management (SIEM) platforms
-Video analytics
- AI-enhanced analytics
- Server-based
-Video management systems (VMS)
Security news: |
Almost 50% of companies choose to pay the ransom
Issue 3 2025, Information Security, News & Events
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years. |
Analyse, automate, and optimise logistics processes
Issue 3 2025, Surveillance, Transport (Industry), Products & Solutions, Logistics (Industry), neaMetrics
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity. |
Survey highlights cost of cyberdamage to industrial companies
Issue 3 2025, Information Security, News & Events, Kaspersky
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million. |
Gallagher Security achieves ISO 27001 recertification
Issue 3 2025, News & Events, Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security. |
Digital economy needs an agile approach to cybersecurity
Issue 3 2025, Information Security, News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks |
IQ Panels now supported by PowerManage
Issue 3 2025, Products & Solutions, Johnson Controls - (Tyco Security Products)
IQ Panels, now supported by PowerManage, simplify installation and data management. The PowerManage interactive platform allows for localised data storage, so customer information is not stored in the cloud or exposed to a third party. |
Value and industry insight
Issue 3 2025, News & Events, Training & Education, Securex South Africa
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing. |
SIEM rule threat coverage validation
Issue 3 2025, Information Security, News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections. |
visit www.securitysa.com |
|
|
|
|
|