-
Hi-Tech Security Business Directory (HSBD)
B-Safe IT
B-Safe IT

78 4th Street, Northmead, Benoni

cell:  
+27 82 557 3901
email:  
[email protected]
url:  
www.bsafe.co.za

Core business offering: B-Safe IT is a security and communications consultant and integrator specialising in all electronic security and communications services.


App Panic
(Sole Agency)
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Barcode
- Dual/multi technology
- Laser
- Optical
- Proximity
- RFID
- Smartcard
-Control systems
- Card coding/deletion/programming
- Card/keypad combination
- Control reports
- Integrated building management
- Multi-alarm capability
- Multi-building
- Remote monitored/hosted
-Facial recognition
-Fingerprint analysis
-Hand geometry
-Other
-Palm analysis
-Vein analysis
-Bullet resistant
-Delayed egress systems
-Door entry systems
-Electrically-powered door operators
-Electronic locking systems
-Exit systems
- Electronic
- Mechanical
-Fire doors
-Portals (mantraps)
-Revolving doors
-Security doors
-Vault doors
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Card/PIN
- Fire resistant
- Programmable
- Pushbutton
-Visitor management systems
- Cloud-based
-Visitor management/tracking systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Audio equipment
- Digital communicating equipment
- Remote controls with zone annunciation
- Remote light controls
- Remote release
- Reporting equipment
- RF telemetry equipment
- Video verification equipment
-Control panels
- Arm/disarm stations
- Graphic panels (icons)
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Batteries
- Battery backup
- Battery testers/analysers
- Cabinets & racks
- Installation materials
-Power or environment sensors
- AC & UPS power failure protection
- Fire
- Gas/toxic vapour
- Humidity
- Lightning protection devices
- Surge protection devices
- Temperature
- Water presence/level
-Radio communications
- Antennas
- Base stations
- Outstations
- Transmitters
-Remote monitoring
- GSM/cellular
-Audio
-Buried sensors
-Dual technology detectors
-Electromagnetic, field disturbance
-Electrostatic, field disturbance
-Infrared illuminators
-Infrared, active
-Infrared, passive (PIR)
-Loop detectors
-Motion detectors
-Photoelectric beam
-Portable intrusion detection
-Pressure sensors, buried
-Proximity sensors
-Seismic sensors, buried
-Shock detectors
-Taut wire systems
-Vibration sensors
-Audio detection
- Audio discriminators/microphones
- Transducer cable
-Beam protectors
-Capacitance proximity detectors
-Contacts, door & window switches
-Continuity loops
- Door loops
- Electrical loops
- Window screens
-Emergency switches
-Light sensors
-Motion detectors
- Dual detectors
- Infrared, passive
- Microwave
- Photoelectric
- Strain/flex detectors
- Ultrasonic
- Video motion detectors
-Panic buttons
-Pressure sensing materials
-Proximity sensor
-Seismic sensors
-Stress detection
-Switch mats/ribbon switches
-Vault alarm
-Vibration/shock detectors
-Window grilles, alarms & shutters
Section - IoT/IT security infrastructure
-Authentication & identity verification systems
-Remote access security
-Usage management & monitoring
-Cabinets
-Communication security solutions
-Consoles - workstations, desk
-Edge security solutions
-Network hardware
-Network management s/w
-Network optimisation
-Network security appliance
-Network security solutions
-Other networking equipment
-Portable wireless networking equipment
-Racks & sub-racks
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
Section - Perimeter security
-Barriers, vehicle
- Bollards
- Cable crash beam
- Crash-rated gate
- Vehicle disabler
- Wedge
-Fences, electric
- Controllers, electric fence
- Insulators, electric fence
- Lethal energiser system (with alarm)
- Low-voltage surveillance (with alarm)
- Non-lethal energiser system (with alarm)
- Portable power fence auger
-Fences, non-electric
-Guard rails
-Outdoor wireless early warning alarm systems
-Perimeter intrusion detection systems (PIDS)
-Gate automation, accessories
- Daylight switches
- Lightning protection
- Remote controls
- Safety beams
- Wireless transmitters/receivers/beams
-Gate automation/operators/motors
- Domestic slider
- Domestic swing
- Garage door automation
- Gate automation systems
- Gate operators, powered
- Industrial slider
- Industrial swing
- Solar powered
-Gates
- Sliding
- Swinging
-Turnstiles
- Full height
- Mechanical
- Optical
Section - Service providers
-Control rooms
- Design & construction
-Services offered
- AI & analytic services
- Alarm monitoring
- Reaction & dispatch
- Video analytics
- Video management
- Video monitoring
-Communications
-Electrical
-Risk assessments
-Security in general
-Technical focus
- Access control
- Asset management, EAS, RFID
- CCTV, surveillance
- Control room design & management
- Cyber & Information security
- Enterprise solutions
- Identity management
- Perimeter security, alarms & intruder detection
-Agriculture
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
-Access Control as a Service (ACaaS)
-Building information services
-Business continuity services
-Control room design
-Monitoring services
-Security as a Service
-Video analytics
-Video Surveillance as a Service (VSaaS)
-Access control systems
- Access control systems
- Asset management systems
- Audio & video controls
- Biometric systems
- Cloud-based/hosted systems
- ID badge & card services
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Smartcard systems
- Visitor management systems
- Visitor tracking systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Market segment served - domestic
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Evacuation systems
- Network communications
- Video/audio intercom systems
- Wireless (incl. cellular)
-Information security
- User monitoring solutions
-IT, network and data centre infrastructure
-Perimeter security
- Electric fencing
- Gate & door automation
- Intruder detection (exterior)
- Non-electric fencing
- Parking barriers
- Vehicle detection
-Surveillance systems
- Covert surveillance
- IP/analogue surveillance
- Remote monitoring
- Video analytics / AI analytics
- Video management systems
-Vehicle security systems
- Alarms, immobilisers, gearlocks
- Anti-hijacking systems
- Parking control systems
- Vehicle tracking, fleet management systems
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Industrial & manufacturing
-Logistics
-Mining
-Residential estates
-Retail
-Safe city
-Transport
-Warehousing
Section - Surveillance equipment
-Anti-theft devices
-Consoles/enclosures for CCTV systems
-Housings, camera
- Domes/spheres/hemispheres
- Dust-proof
- Ergonomic (indoor)
- Explosion-proof
- Extreme environmental
- Heater/defroster kits
- High-temperature
- Integrated low-light enhancement
- Pressurised
- Radiation proof
- Special-purpose
- Vandal-proof
- Washer & wiper units
- Weather-proof
-Lighting
- Control devices
- Fixtures
- Infrared
- Portable generators & lights
- Security
-Unmanned Aerial Vehicles (UAV)/drones
-Video monitors
-Video multiplexers
-Cables
-Camera test targets
-Connectors
-Enclosures
-Gyroscopic stabilised platforms
-Light meters
-Mounting brackets, accessories
-Tools
-Towers
-Video analytics
- AI-enhanced analytics
- On-camera
- Remote/cloud-based
- Server-based
-Video management systems (VMS)
-Video recorders
- Digital video recorders (DVR)
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
- Storage servers/arrays
-Video sequencers
Security news:
Bosch Security renamed Keenfinity
Issue 3 2025, News & Events

Globally renowned brands for video systems, access control and intrusion alarm systems, as well as communication systems, unite under the roof of the new company Keenfinity Group.

Open source code can also be open risk
Issue 3 2025, Information Security, Infrastructure

Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Dallmeier and Hexagon form a technology partnership
Issue 3 2025, Surveillance

Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

DeepSneak deception
Issue 3 2025, Information Security, News & Events

Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Unified storage solution
Issue 3 2025, Infrastructure, Products & Solutions

CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Biometric security key for phishing-resistant MFA
Issue 3 2025, Access Control & Identity Management, Products & Solutions

New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Wialon announces integration with fleet maintenance and optimisation platform
Issue 3 2025, News & Events, Transport (Industry), Logistics (Industry)

Fleet management software platform integrates with a fleet maintenance and optimisation platform to support mutual customers for better workflows and deeper insights into fleet operations.

SA’s strained, loadshedding-prone grid faces cyberthreats
Issue 3 2025, Information Security, Power Management

South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.