|
Symmetric Technology Software
Unit A18, Bellville Business Park, cnr Voortrekker Road & Mike Pienaar Blvd, Bellville, Cape Town
Core business offering: Symmetric Technology Software manufactures integrated security management solutions and a platform for system integration software suites. The software comprises data visualisation (SCADA) technology, scripting, sensor data collection, generic systems integration, PSIM, incident, asset, evidence management, and logging in the distributed GUI, web, and mobile spaces. Clients include integrators and large corporations.
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
ISMS
(Manufacturer) |
PSI Connect
(Manufacturer) |
PSI Tech
(Manufacturer) |
Section - Access control & identity management
-Card technology
- RFID
-Control systems
- Control reports
- Integrated building management
- Multi-alarm capability
- Multi-building
- Remote monitored/hosted
Section - Asset management
-Asset tracking systems
- Active
- Passive
Section - Building management
-Building information software
-Building management
-Environmental monitoring
-Infrastructure solutions
-Enterprise asset management (EAM)
-Equipment maintenance
-Facilities management & maintenance
Section - Service providers
-Building information services
Security news: |
Almost 50% of companies choose to pay the ransom
Issue 3 2025, Information Security, News & Events
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years. |
Analyse, automate, and optimise logistics processes
Issue 3 2025, Surveillance, Transport (Industry), Products & Solutions, Logistics (Industry), neaMetrics
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity. |
Survey highlights cost of cyberdamage to industrial companies
Issue 3 2025, Information Security, News & Events, Kaspersky
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million. |
Gallagher Security achieves ISO 27001 recertification
Issue 3 2025, News & Events, Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security. |
Digital economy needs an agile approach to cybersecurity
Issue 3 2025, Information Security, News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks |
IQ Panels now supported by PowerManage
Issue 3 2025, Products & Solutions, Johnson Controls - (Tyco Security Products)
IQ Panels, now supported by PowerManage, simplify installation and data management. The PowerManage interactive platform allows for localised data storage, so customer information is not stored in the cloud or exposed to a third party. |
Value and industry insight
Issue 3 2025, News & Events, Training & Education, Securex South Africa
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing. |
SIEM rule threat coverage validation
Issue 3 2025, Information Security, News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections. |
visit www.securitysa.com |
|
|
|
|
|