-
Hi-Tech Security Business Directory (HSBD)
StratIT Holdings

9 Pulpit Street, Southdowns Estate, Irene, Centurion

cell:  
+27 83 445 0120
email:  
[email protected]
url:  
www.stratitholdings.com

Core business offering: StratIT Holdings offers innovative, integrated technology solutions to manage the security risks clients may face. Its abilities and skills provide unrivalled solutions to address its clients' needs. Its solutions cater to a broad spectrum of personal and business risks. It delivers simple, yet effective solutions, like Thermal Imaging Radar, Ctera, Opengear, Dig, Cloudian, and other technology solutions. As a value-added distributor, StratIT Holdings works with strategic reseller partners to supply and support technology across the African continent.


Gauteng (Centurion)

tel: +27 83 445 0120
[email protected]
Briedenhann, Christo
CEO
[email protected]
Els, Dries
CTO
[email protected]
Schoeman, Johan
Chief Operational Officer
[email protected]
Wolmarans, Deidre
Marketing
[email protected]
Cloudian

tel:
CTERA

tel:
Digi International

tel:
Opengear

tel:
Thermal Imaging Radar

tel:
Avigilon
(Shared Agency)
Clip Training
(Sub Agency)
CLOUDIAN
(Sole Agency)
CTERA
(Sole Agency)
Digi International
(Shared Agency)
HIKMicro
(Shared Agency)
Hikvision
(Sub Agency, Installer)
Opengear
(Sole Agency)
Thermal Imaging Radar
(Sole Agency, Installer)
Section - Access control & identity management
-Control systems
- Storage/backup control software
-Door entry systems
Section - Alarm systems - sensors, panels & systems
-Infrared, active
-Motion detectors
-Portable intrusion detection
-Panic buttons
-Vibration/shock detectors
Section - Asset management
-Asset tracking systems
- Passive
-Concealed EAS systems
-Fluorescent/UV marking
-Marking materials & services
-Microdot ID
Section - Communications equipment
-Infrared
-IP/network
-Microwave
-Recording, audio/video equipment
-Routers/modems
-2-way
-Base-stations
-Recording systems
Section - IoT/IT security infrastructure
-Computers & accessories
-Cyber surveillance equipment
-Network security appliance
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Disaster recovery services
-Encryption s/w
-IoT/Edge security s/w
-Network security s/w
-Remote/hosted security s/w & services
-Risk management s/w
-Network hardware
-Network management s/w
-Network optimisation
-Network security appliance
-Network security solutions
-Fault-tolerant solutions
-LAN/WAN solutions
-Network management solutions
-Remote access technologies
-Routers
-Switches
-Digital video recorders (DVR)
-Network video recorders (NVR)
-SAN/NAS
-Storage management
- Backup/recovery
- Clustering
- Security
Section - Other security equipment
-Alarms
- Interior
- Perimeter
-Fleet management systems
-Tracking devices
- GSM
- Satellite (GPS)
-Vehicle tracking
Section - Perimeter security
-Infrared
-Radar/lidar
-Thermal
Section - Service providers
-Access Control as a Service (ACaaS)
-AI-enhanced services
-Backup & recovery
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
-Security as a Service
-Video analytics
-Video Surveillance as a Service (VSaaS)
-Access control systems
- Cloud-based/hosted systems
-Information security
- Cybersecurity monitoring systems
- Cybersecurity protection systems
-IT, network and data centre infrastructure
-Perimeter security
- Intruder detection (exterior)
- Vehicle detection
-Vehicle security systems
- Vehicle tracking, fleet management systems
Section - Surveillance equipment
-Anti-theft devices
-Consoles/enclosures for CCTV systems
-Housings, camera
- Domes/spheres/hemispheres
- Dust-proof
- Ergonomic (indoor)
- Explosion-proof
- Extreme environmental
- High-temperature
- Integrated low-light enhancement
- Special-purpose
- Vandal-proof
- Weather-proof
-Lighting
- Control devices
- Security
-Unmanned Aerial Vehicles (UAV)/drones
-Video analytics
- On-camera
- Remote/cloud-based
-Video management systems (VMS)
-Camera controls
- Multiplexers
- Pan/tilt/zoom (PTZ indoor)
- Pan/tilt/zoom (PTZ outdoor)
-Cameras
- Body-worn cameras Cameras: Body-worn cameras
- Combination thermal & visual sensors Cameras: Combination thermal & visual sensors
- Concealed, covert
- Fixed Cameras: Fixed
- High definition (HD) - IP
- Industrial use thermals
- Infrared
- Low light
- Network/IP
- Night vision equipment
- PTZ Cameras: PTZ
- UAV/drone mounted
-Digital video systems
- Remote monitoring systems
- Visual verification systems
-Lenses
- Panoramic
-Perimeter solutions
- Dual thermal/visual camera monitoring
- Perimeter video monitoring s/w
- Portable monitoring stations
- Radar
- Thermal camera monitoring
-Thermal cameras
- Fixed
- Handheld
- Industrial use
- Long distance
- Portable
- PTZ
-UAV/drones
- Commercial
- Domestic
- Military
- Services
- Support & maintenance
-Video recorders
- Digital video recorders (DVR)
- Network video recorders (NVR)
News from StratIT Holdings :
Retail-centric products
February 2019, Perimeter Security, Alarms & Intruder Detection, Retail (Industry), Products & Solutions, StratIT Holdings

When it comes to planning and securing retail environments, there are a host of products users can choose from.

Security news:
Navigating a modern, layered security landscape
February 2026, Perimeter Security, Alarms & Intruder Detection, News & Events, Smart Home Automation

The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Cyber remains top business risk, but AI fastest riser at #2
February 2026, News & Events, Security Services & Risk Management

The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Intelligent access at the gate
January 2026, Access Control & Identity Management, Residential Estate (Industry)

LD Access provides a smart, streamlined approach to boom gate security, enhancing the verification of people and vehicles before entry. Through its Self-Service Scanning Kiosk and Mobile Scanning Unit, LD Access delivers secure, automated access control.

CAA-compliant ground drone outsourcing
February 2026, Surveillance, IoT & Automation

South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

OT calculator to align cyber investments with business goals
February 2026, Information Security, Security Services & Risk Management, Industrial (Industry)

The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Protecting high-value data from AI
February 2026, Information Security, Infrastructure, Products & Solutions, CASA Software

As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

From friction to trust
February 2026, Information Security, Security Services & Risk Management, Financial (Industry)

Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

The age of Lean 4.0: Orchestrating intelligence and efficiency
January 2026, Security Services & Risk Management

The convergence of Lean principles and AI (what we now call Lean 4.0) is no longer a theoretical exercise; it is the defining operational paradigm for survival and growth in a complex, data-intensive economy.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.