|
|
Dtron Communications
Unit A18, Bellville Business Park, cnr Voortrekker Road , & Mike Pienaar Boulevard, Bellville, Cape Town
Core business offering: Dtron Communications’ main division specialises in developing and manufacturing niche access solutions (controllers, one-time PIN, end-to-end encryption, biometric and RFID), secure lockers, key cabinets and vandal-proof VoIP intercom and recording systems. Its secondary division is a solutions distributor for the security, energy and automation sectors.
|
| Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
| Shared Agency | This is one of several companies with official rights to distribute this brand |
| Sub Agency | This company purchases from an officially appointed local distributor |
| Manufacturer | This company manufactures this brand |
| Installer | This company is an approved installer or system integrator of this brand | |
AccessLink
(Manufacturer) |
DMedi
(Manufacturer) |
DSafe
(Manufacturer) |
DTRON
(Manufacturer) |
ESM 5000
(Manufacturer) |
Section - Access control & identity management
-Access control readers & control units
-Card technology
- RFID
-Control systems
- Control reports
- Integrated building management
- Multi-alarm capability
- Multi-building
- Remote monitored/hosted
- Storage/backup control software
-Portals
- Biometric
- Programmable
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Audio equipment
- Digital communicating equipment
- Remote release
-Miscellaneous alarm equipment
- Battery backup
-Power or environment sensors
- AC & UPS power failure protection
- Temperature
- Water presence/level
-Remote monitoring
- GSM/cellular
-Infrared, passive (PIR)
-Portable intrusion detection
Section - Asset management
-Asset tagging systems
-Asset tracking systems
- Active
- Passive
-Barcode
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Communications equipment
-IP/network
-Recording, audio/video equipment
-Repeaters
-Secure telecommunications products
Section - Physical security - locks, safes & containers
-Key control equipment
-Key management systems
-Key storage cabinets
-Key tags, identification & accountability systems
-Key tracking systems
Security news: |
IQ and AI
Issue 6 2025, Surveillance, Editor's Choice, AI & Data Analytics, Leaderware
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms. |
Is your entrance security secure?
Issue 6 2025, Access Control & Identity Management, News & Events, Smart Home Automation, SMART Security Solutions, Centurion Systems, Technews Publishing
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security. |
What is your ‘real’ security posture? (Part 2)
Issue 6 2025, Information Security, Infrastructure, Editor's Choice, BlueVision
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them. |
ONVIF to end support for Profile S
Issue 6 2025, Surveillance, News & Events
ONVIF has announced that it will end support for ONVIF Profile S and recommends using its successor, Profile T. Profile S is the first-ever profile introduced by ONVIF in 2011. |
HMA takes on Africa’s fire market
Issue 6 2025, Fire & Safety
HMA South Africa is positioning itself as a trusted partner in fire detection, suppression, and explosion-proof safety solutions across the continent, offering clients regulatory compliance as well as long-term protection for mission-critical operations.
|
New agent gateway to mitigate shadow MCP risk
Issue 6 2025, AI & Data Analytics
Agent Gateway, a new capability in the Tray AI Orchestration platform, gives IT power to develop approved MCP tools with policies, permissions, versioning and compliance, then publish them via MCP for secure agent use. |
Syndicates exploit insider vulnerabilities in SA
Issue 6 2025, Information Security, Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.
|
The overlooked risks of everyday connectivity
Issue 6 2025, Information Security
That free Wi-Fi you are using could end up costing you a lot more money than your hotspot data if it has been compromised, says Richard Frost, head of technology solutions and consulting at Armata Cyber Security. |
| visit www.securitysa.com |
|
|
|
|
|