|
|
Boland Systems
Core business offering: Boland Systems is a professional installer and integrator of electronic security systems.
|
| Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
| Shared Agency | This is one of several companies with official rights to distribute this brand |
| Sub Agency | This company purchases from an officially appointed local distributor |
| Manufacturer | This company manufactures this brand |
| Installer | This company is an approved installer or system integrator of this brand | |
Behringer
(Sub Agency, Installer) |
Bosch Security Systems
(Sub Agency, Installer) |
Centurion
(Sub Agency, Installer) |
Dahua Technology
(Sub Agency, Installer) |
Hikvision
(Sub Agency, Installer) |
IDEMIA
(Sub Agency) |
IDS
(Sub Agency, Installer) |
JBL
(Sub Agency, Installer) |
Microsound
(Sub Agency, Installer) |
MikroTik
(Sub Agency, Installer) |
Mobotix
(Sub Agency, Installer) |
Nemtek
(Sub Agency, Installer) |
Nice
(Sub Agency, Installer) |
OPTEX
(Sub Agency, Installer) |
Paradox
(Sub Agency, Installer) |
Paxton
(Sub Agency, Installer) |
Sherlotronics
(Sub Agency, Installer) |
Shure
(Sub Agency, Installer) |
Softcon
(Sub Agency, Installer) |
TOA
(Sub Agency, Installer) |
Ubiquiti
(Sub Agency, Installer) |
Virdi
(Sub Agency, Installer) |
Vizpin
(Sub Agency, Installer) |
Zartek
(Sub Agency, Installer) |
ZKTeco
(Sub Agency, Installer) |
Section - Service providers
-Access control systems
- Access control systems
- Audio & video controls
- Biometric systems
- Cloud-based/hosted systems
- Revolving doors & turnstiles
- Smartcard systems
- Visitor management systems
- Visitor tracking systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - domestic
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Network communications
- Video/audio intercom systems
- Wireless (incl. cellular)
-Locks and safes
- Electronic locks
- Mechanical locks
-Perimeter security
- Electric fencing
- Gate & door automation
- Intruder detection (exterior)
- Vehicle detection
-Surveillance systems
- Covert surveillance
- IP/analogue surveillance
- Video analytics / AI analytics
- Video management systems
-Commercial
-Education
-Healthcare
-Residential estates
-Retail
-Warehousing
Security news: |
IQ and AI
Issue 6 2025, Surveillance, Editor's Choice, AI & Data Analytics, Leaderware
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms. |
Is your entrance security secure?
Issue 6 2025, Access Control & Identity Management, News & Events, Smart Home Automation, SMART Security Solutions, Centurion Systems, Technews Publishing
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security. |
What is your ‘real’ security posture? (Part 2)
Issue 6 2025, Information Security, Infrastructure, Editor's Choice, BlueVision
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them. |
ONVIF to end support for Profile S
Issue 6 2025, Surveillance, News & Events
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011. |
HMA takes on Africa’s fire market
Issue 6 2025, Fire & Safety
HMA South Africa is positioning itself as a trusted partner in fire detection, suppression, and explosion-proof safety solutions across the continent, offering clients regulatory compliance as well as long-term protection for mission-critical operations.
|
New agent gateway to mitigate shadow MCP risk
Issue 6 2025, AI & Data Analytics
Agent Gateway, a new capability in the Tray AI Orchestration platform, gives IT power to develop approved MCP tools with policies, permissions, versioning and compliance, then publish them via MCP for secure agent use. |
Syndicates exploit insider vulnerabilities in SA
Issue 6 2025, Information Security, Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.
|
The overlooked risks of everyday connectivity
Issue 6 2025, Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security. |
| visit www.securitysa.com |
|
|
|
|
|