|
Dtron Communications
Unit A18, Bellville Business Park, Cnr Voortrekker Road & Mike Pienaar Blvd, Bellville, Cape Town
Core business offering: Dtron Communications’ main division specialises in developing and manufacturing niche access solutions (controllers, one-time PIN, end-to-end encryption, biometric and RFID), secure lockers, key cabinets and vandal-proof VoIP intercom and recording systems. Its secondary division is a solutions distributor for the security, energy and automation sectors.
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
AccessLink
(Manufacturer) |
DMedi
(Manufacturer) |
DSafe
(Manufacturer) |
DTRON
(Manufacturer) |
ESM 5000
(Manufacturer) |
Section - Access control & identity management
-Access control readers & control units
-Card technology
- RFID
-Control systems
- Control reports
- Integrated building management
- Multi-alarm capability
- Multi-building
- Remote monitored/hosted
- Storage/backup control software
-Portals
- Biometric
- Programmable
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Audio equipment
- Digital communicating equipment
- Remote release
-Miscellaneous alarm equipment
- Battery backup
-Power or environment sensors
- AC & UPS power failure protection
- Temperature
- Water presence/level
-Remote monitoring
- GSM/cellular
-Infrared, passive (PIR)
-Portable intrusion detection
Section - Asset management
-Asset tagging systems
-Asset tracking systems
- Active
- Passive
-Barcode
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Communications equipment
-IP/network
-Recording, audio/video equipment
-Repeaters
-Secure telecommunications products
Section - Physical security - locks, safes & containers
-Key control equipment
-Key management systems
-Key storage cabinets
-Key tags, identification & accountability systems
-Key tracking systems
Security news: |
Super election year increases risks of political violence
April 2024, Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation. |
AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture. |
2024 State of Security Report
April 2024, Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time. |
How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities. |
Cyberthreats facing SMBs
April 2024, Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.
|
Are we our own worst enemy?
April 2024, Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa. |
Protecting IP and secret data in the age of AI
April 2024, Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data. |
What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it. |
visit www.securitysa.com |
|
|
|
|
|