|
|
AcoustAlert
30 Burt Drive, Newton Park, Gqeberha
Core business offering: AcoustAlert is a cost-effective perimeter intrusion detection system (PIDS) that uses the microphonic effect of special sensor cables to listen to your fence and detect persons cutting, climbing or interfering with the fence. Detection zones can span up to 300 metres. AcoustAlert is made in South Africa.
|
| Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
| Shared Agency | This is one of several companies with official rights to distribute this brand |
| Sub Agency | This company purchases from an officially appointed local distributor |
| Manufacturer | This company manufactures this brand |
| Installer | This company is an approved installer or system integrator of this brand | |
AcoustAlert
(Manufacturer) |
Section - IoT/IT security infrastructure
-Other networking equipment
Section - Perimeter security
-Perimeter intrusion detection systems (PIDS)
Section - Service providers
-Risk assessments
-Technical focus
- Perimeter security, alarms & intruder detection
-Commercial
-Government & parastatal
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Transport
-Warehousing
-Perimeter security
- Intruder detection (exterior)
-Commercial
-Government & parastatal
-Industrial & manufacturing
-Logistics
-Mining
-Transport
-Warehousing
| News from AcoustAlert: |
Perimeter protection in Ghana
October 2019, Perimeter Security, Alarms & Intruder Detection, Mining (Industry), AcoustAlert
A gold mine in Ghana has erected a dual fence with AcoustAlert PIDS fence detection on both inner and outer fence lines. |
Perimeter security in high EMF environments
October 2019, Perimeter Security, Alarms & Intruder Detection, AcoustAlert
Testing AcoustAlert PIDS on extra high tension sites like power stations and power generating gas turbine plants. |
Security news: |
What is your ‘real’ security posture?
Issue 6 2025, Information Security, Infrastructure, Editor's Choice, AI & Data Analytics, BlueVision
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe? |
GenAI fraud forcing banks to shift from identity to intent
Issue 6 2025, Information Security, Financial (Industry), AI & Data Analytics
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net. |
Cyber attack surface expanding
Issue 6 2025, Information Security, Asset Management, Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities. |
Fire safety cannot be ignored
Issue 6 2025, Fire & Safety
Fire safety is a combination of technology, product certifications, and experience that ensures that every project is planned correctly at inception according to client requirements, while meeting SANS standards. |
New Edge AI Plus PTZ cameras with analytics
Issue 6 2025, Surveillance, Products & Solutions
IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality. |
Recording 40 high-resolution channels
Issue 6 2025, Surveillance, Products & Solutions, Dallmeier Electronic Southern Africa
With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity. |
Understanding shared responsibility
Issue 6 2025, Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up. |
| visit www.securitysa.com |
|
|
|
|
|