|
Servest Technical Services
Servest Building, Corner of Bridal Veil Road & Tugela Lane, Waterfall Logistics Precinct
Core business offering: Servest Technical Services provides world-class technology solutions to ensure your business is at the forefront of disruptive and innovative technologies in the paid parking, security and building management spaces. The company’s principal activities involve the design, supply, project management, installation and maintenance of our technology solutions.
|
Eastern Cape
tel: +27 41 374 0451
|
Free State
tel: +27 51 432 0623
|
Kwazulu Natal
tel: +27 31 701 7690
|
Mpumalanga
tel: +27 13 656 2704
|
Western Cape
tel: +27 21 557 9960
|
Compass Security |
Gauteng
tel: +27 11 314 0133
|
Designa |
Gauteng
tel: +27 83 230 1908
|
Duxbury Networking |
Gauteng
tel: +27 11 351 9800
|
Elvey Security Technologies |
Gauteng
tel: +27 11 401 6700
|
Gallagher |
Gauteng
tel: +27 11 974 4740
|
IOT Rev-Tech |
Gauteng
tel: +27 82 572 4756
|
LunarX |
Gauteng
tel: +27 11 266 7000
|
Regal Security |
Gauteng
tel: +27 11 553 3300
|
Sensor Security |
Gauteng
tel: +27 11 314 9419
|
Turnstar Systems |
Gauteng
tel: +27 11 786 1633
|
VCam Security |
Gauteng
tel: +27 87 750 0866
|
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Barcode
- Dual/multi technology
- Laser
- Magnetic stripe
- Optical
- Proximity
- RFID
- Smartcard
-Control systems
- Card coding/deletion/programming
- Control reports
- Integrated building management
- Lift/elevator control software
- Multi-alarm capability
- Multi-building
- Parking management/control software
- Time & attendance integration
-Digital/computer access control solutions
-Facial recognition
-Fingerprint analysis
-Door entry systems
-Electronic locking systems
-Exit systems
- Electronic
- Mechanical
-Cloud based
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Card/PIN
- Pushbutton
-Visitor management systems
- Cloud-based
-Visitor management/tracking systems
Section - Alarm systems - sensors, panels & systems
-Audio
-Infrared illuminators
-Infrared, passive (PIR)
-Loop detectors
-Motion detectors
-Photoelectric beam
-Shock detectors
-Taut wire systems
-Vibration sensors
Section - Communications equipment
-Intercoms
- Push-to-talk
- Standalone intercoms
- Talk-through communicators
- Telephone intercoms
- Videophone intercoms
-IP/network
-Public address & paging systems
Section - Perimeter security
-Barriers, vehicle
- Bollards
- Cable crash beam
- Crash-rated gate
- Wedge
-Fences, electric
- Controllers, electric fence
- Insulators, electric fence
- Lethal energiser system (with alarm)
- Low-voltage surveillance (with alarm)
- Non-lethal energiser system (with alarm)
- Portable power fence auger
-Fences, non-electric
-Outdoor wireless early warning alarm systems
-Perimeter intrusion detection systems (PIDS)
Section - Surveillance equipment
-Physical security info management platforms (PSIM)
-Security information and event management (SIEM) platforms
-Video analytics
- AI-enhanced analytics
- On-camera
- Remote/cloud-based
- Server-based
-Video management systems (VMS)
Security news: |
Super election year increases risks of political violence
April 2024, Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation. |
AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture. |
2024 State of Security Report
April 2024, Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time. |
How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities. |
Cyberthreats facing SMBs
April 2024, Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.
|
Are we our own worst enemy?
April 2024, Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa. |
Protecting IP and secret data in the age of AI
April 2024, Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data. |
What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it. |
visit www.securitysa.com |
|
|
|
|
|