-
Hi-Tech Security Business Directory (HSBD)
LunarX Consulting and Projects

820 16th Road, Randjespark, Midrand

tel:  
+27 11 266 7000
email:  
[email protected]
url:  
www.lunarx.co.za

Core business offering: LunarX Consulting and Projects provides life safety solutions and products from globally recognised OEMs to the enterprise and public sector project market in South Africa and Africa. Its services include high-end consultation work, contractual support agreements, and comprehensive solution designs with technical support for system integrators and end-users, including fire detection, surveillance, access control, public address, voice evacuation, building management and wireless network solutions.


Cape Town

tel: +27 21 510 1445
[email protected]
Durban

tel: +27 31 263 0305
[email protected]
Johannesburg

tel: +27 11 266 7000
[email protected]
Port Elizabeth

tel: +27 41 581 0316
[email protected]
Free State

tel: +27 51 065 0387
[email protected]
Snyman, Elmar
Chief Operating Officer
[email protected]
Arteco
(Shared Agency)
Bosch Security Systems
(Shared Agency)
Dahua Technology
(Shared Agency)
Energon
(Sole Agency)
Hanwha Vision
(Sub Agency)
Impro
(Shared Agency)
Salto Systems
(Shared Agency)
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Magnetic stripe
- RFID
- Smartcard
-Control systems
- Card/keypad combination
- Integrated building management
- Multi-alarm capability
- Multi-building
- Parking management/control software
- Storage/backup control software
- Time & attendance integration
-Facial recognition
-Fingerprint analysis
-Other
-Blast resistant
-Bullet resistant
-Door entry systems
-Electrically-powered door operators
-Electronic locking systems
-Exit systems
- Electronic
- Mechanical
-Fire doors
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Card/PIN
- Fire resistant
- Pushbutton
-Visitor management systems
- Cloud-based
-Visitor management/tracking systems
-ID card systems
-ID cards
-Identity management policies
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Audio equipment
- Digital communicating equipment
- Remote controls with zone annunciation
- Video verification equipment
-Control panels
- Programmable remotely
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Batteries
- Battery backup
- Cabinets & racks
- Installation materials
-Power or environment sensors
- Fire
- Humidity
- Temperature
Section - Asset management
-Metal detectors
-Metal detectors, walk-through
-X-ray screening equipment
Section - Building management
-Building information software
-Building management
-Energy supply & management
-Environmental monitoring
-HVAC
-Infrastructure solutions
-Software development & integration
Section - Fire protection products & systems
-Alarm boxes, fire
-Arrestors
- Flame
- Lightning, surge
- Spark
-Audio-visual indicators
-Cables & wires
- Fire resistant
-Computer & software
- Fire detection system design
-Control panels
- Analogue addressable
- Conventional
-Detectors, air sampling/early warning
-Detectors, fire
- Multisensor technology
- Temperature
- Video/thermal
-Detectors, flame
- Infrared
- Multiple spectrum
- UV sensor
- Video/thermal
-Detectors, heat
- Video/thermal
-Fire rated glass
-Graphic displays
-Intercoms
-Life safety devices & accessories
- Emergency response supplies
- Signs & decals
-Panic devices
-Strobe lights
Section - Perimeter security
-Combination of lenses
-Infrared
-Radar/lidar
-Thermal
-Visual light camera
Section - Surveillance equipment
-Anti-theft devices
-Housings, camera
- Domes/spheres/hemispheres
- Dust-proof
- Ergonomic (indoor)
- Explosion-proof
- Extreme environmental
- High-temperature
- Integrated low-light enhancement
- Special-purpose
- Vandal-proof
- Weather-proof
-Video monitors
-Cables
-Connectors
-Enclosures
-Mounting brackets, accessories
-Tools
-Physical security info management platforms (PSIM)
-Video analytics
- AI-enhanced analytics
- On-camera
- Remote/cloud-based
- Server-based
-Video management systems (VMS)
Security news:
Super election year increases risks of political violence
April 2024, Editor's Choice

Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice

Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

2024 State of Security Report
April 2024, Editor's Choice

Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice

Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Cyberthreats facing SMBs
April 2024, Editor's Choice

Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Are we our own worst enemy?
April 2024, Editor's Choice

Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Protecting IP and secret data in the age of AI
April 2024, Editor's Choice

The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security

Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.