Hi-Tech Security Business Directory (HSBD)

Block D, Hurlingham Office Park, Woodlands Avenue, Hurlingham Manor

+27 83 252 5727

Core business offering: Secnovate offers both cybersecurity and homeland security solutions. Our compliance and risk management includes security assessments (vulnerability, penetration, DDoS and BCP/DRP), compliance readiness (POPIA/GDPR), network and end-point security solutions (malware threat detection and remediation), risk management solutions (secure communications), industrial cybersecurity solutions, consulting services and training.

Section - Asset management
-Asset tagging systems
-Asset tracking
-Asset tracking systems
- Active
- Passive
-Concealed EAS systems
-Electronic article surveillance (EAS)
-Electronic tagging
-Engraving & etching
-Hard tag detachers
-Label/tag activators/deactivators
-Label/tag applicators
-Labelling/tagging systems
-Marking materials for property
-Microdot ID
-Proximity deactivators
-Security printing
-Source tagging
-Unique chemical ID
Section - Communications equipment
-GSM cellular data/voice communications
-IP/network communications
-Secure telecommunications products
-Voice scrambling devices
Section - IT infrastructure for security
-Cyber surveillance equipment
-Data encryption equipment
-Secure IoT devices
-Anti-phishing software/services
-Anti-virus/malware s/w
-Asset/user tracking s/w
-Business continuity services
-Copy protection s/w
-Data backup/restore
-Data loss prevention
-Data shredders
-Disaster recovery services
-Employee monitoring s/w
-Encryption s/w
-Governance & compliance s/w
-Identification systems
-IoT/Edge security s/w
-IT audit s/w
-Network security s/w
-Onsite security monitoring s/w & services
-Password protection s/w
-PC/laptop/server security s/w
-Physical security info management platforms (PSIM)
-Remote/hosted security s/w & services
-Risk management s/w
-Secure communication solutions
-Security info & event management platforms (SIEM)
-Security management platforms
-Service providers
- Security service providers
- Software as a Service
-Automated security auditing
-Data privacy tools
-Encryption & key management tools & solutions
-Identity management/user provisioning
-Mobile security
-Network security
-Policy managers
-Remote access security
-Usage management & monitoring
-Vulnerability assessments & penetration testing
-Wireless security
-Communication security solutions
-Network security solutions
-Wireless security solutions
-Network management solutions
Section - Service providers
-Disaster recovery services
-Fraud prevention services
-Investigative services
-Risk assessments
-Risk audits
-Risk assessments
-Security in general
-Technical focus
- Enterprise solutions
- Information security
-Government & parastatal
-Industrial & manufacturing
-Safe city
-Backup & recovery
-Business continuity services
-Control room design
-Disaster recovery
-Eavesdropping detection services
-Engineering, project management
-Monitoring services
- Remote/offsite monitoring
-Security as a Service
-Video analytics
-Access control systems
- Asset management systems
-Communications systems
- Cellular, wireless
- Data communications
-Information security
- Cybersecurity monitoring systems
- Cybersecurity protection systems
- User monitoring solutions
-IT, network and data centre infrastructure
-Surveillance systems
- Covert surveillance
- Remote monitoring
- Video analytics
- Video management systems
-Government & parastatal
-Industrial & manufacturing
-Safe city
-Access control
-Eavesdropping countermeasures
-Fraud detection, prevention, investigation
-Management/supervisor skills
-Networking technology
-Remote monitoring operator training
-Risk management
-Security management
-Software installation/configuration training
News from Secnovate:
Tackling the insider threat
June 2019, Cyber Security, News, Secnovate

Secnovate and its strategic partner, Condyn, has run a series of executive briefings on insider threats, which represents a growing and important threat vector for all organisations, big and small.

Security news:
Unintended consequences of ­technology
June 2019, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Leaderware

The development of general AI capabilities has seen an accompanying concern among some of the key players in the IT space as well as academics internationally.

Optimising deep learning for visual surveillance
June 2019, CCTV, Surveillance & Remote Monitoring

Organisations are demanding solutions that can effectively and accurately harness visual data to help improve their security, safety, and operational effectiveness.

SIM swap fraud expands
June 2019, Cyber Security, News, Financial (Industry)

A new wave of attacks targeting financial services and online services have become very common in South Africa and the wider region.

AI serving border security
June 2019, Access Control & Identity Management, IDEMIA

Recent border security improvements, including use of cutting-edge biometric technology, ensures everyone who enters and leaves a country is safely identified.

Securex 2019 video
June 2019, News, Conferences & Events, Videos, Securex South Africa

Securex 2019 is now behind us, and the organisers have made a video available, taken on the third day of the exhibition, highlighting all that was happening at the show. As can be seen, the visitors were ...

Powell Tronics enhances PT-Guest
June 2019, Access Control & Identity Management, Products, Powell Tronics

Powell Tronics’ PT-Guest 2019 model brings a number of enhancements that increase user-friendliness and overall functionality on both the web application and the scanner option.

Suprema BioLite N2
June 2019, Access Control & Identity Management, Products, Suprema

The BioLite N2 achieves a matching speed of up to 20 000 matches per second and accommodates up to 10 000 users – providing instant matching results with minimal lag time.

Explosion-protected cameras
June 2019, CCTV, Surveillance & Remote Monitoring, Industrial (Industry), Products, Axis Communications SA

New explosion-protected network cameras from Axis Communications can reduce health, safety and environmental risks.

visit www.securitysa.com

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.