|
Khuselo Group
52A Marais Avenue, Monavoni AH, Centurion
Core business offering: Khuselo is a two-way radio communication solution provider. Khuselo is a level 2 B-BBEE communications and security solutions provider. Khuselo offers guaranteed solutions to all your radio communication and guard monitoring needs. Its exceptional services extend across South Africa. Taylor-made, flexible financial solutions are available nationwide. Khuselo does radio right the first time. It has national operations through seven Khuselo offices, eight agencies, and several authorised installers and resellers.
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
Hytera
(Installer) |
iTalk
(Installer) |
Kirisun
(Installer) |
Section - Access control & identity management
-Control systems
- Control reports
- Remote monitored/hosted
- Time & attendance integration
-Digital/computer access control solutions
-Cloud based
-Portals
- Biometric
-Visitor management systems
- Cloud-based
Section - Communications equipment
-Dispatch systems
-GSM cellular
-Intercoms
- Push-to-talk
-Radio data/voice interface
-Recording, audio/video equipment
-Repeaters
-Secure telecommunications products
-2-way
-Antennas
-Base-stations
-Digital (encrypted) radio
-Monitors
-Recording systems
-Repeaters
-Scanners
Security news: |
Bosch Security renamed Keenfinity
Issue 3 2025, News & Events
Globally renowned brands for video systems, access control and intrusion alarm systems, as well as communication systems, unite under the roof of the new company Keenfinity Group. |
Open source code can also be open risk
Issue 3 2025, Information Security, Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components. |
Dallmeier and Hexagon form a technology partnership
Issue 3 2025, Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures. |
DeepSneak deception
Issue 3 2025, Information Security, News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs. |
Unified storage solution
Issue 3 2025, Infrastructure, Products & Solutions
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery. |
Biometric security key for phishing-resistant MFA
Issue 3 2025, Access Control & Identity Management, Products & Solutions
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users. |
Wialon announces integration with fleet maintenance and optimisation platform
Issue 3 2025, News & Events, Transport (Industry), Logistics (Industry)
Fleet management software platform integrates with a fleet maintenance and optimisation platform to support mutual customers for better workflows and deeper insights into fleet operations. |
SA’s strained, loadshedding-prone grid faces cyberthreats
Issue 3 2025, Information Security, Power Management
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally. |
visit www.securitysa.com |
|
|
|
|
|