|
|
Remote Access Control
Core business offering: Remote Access Control was established in 1992 and focuses on professional residential and commercial installations using reliable technologies. It supplies alarms, remotes, access control systems, CCTV, electric fencing, boom gates, garage door automation, electric locks, smart locks, maglocks, intercoms, time & attendance, biometric face recognition, nurse call, and walk-through metal detectors.
|
Section - Access control & identity management
-Access control readers & control units
-Card technology
- Dual/multi technology
- Magnetic stripe
- Optical
- Proximity
- RFID
- Smartcard
-Control systems
- Card coding/deletion/programming
- Card/keypad combination
- Control reports
- Multi-alarm capability
- Time & attendance integration
-Digital/computer access control solutions
-Facial recognition
-Fingerprint analysis
-Hand geometry
-Palm analysis
-Door entry systems
-Electrically-powered door operators
-Electronic locking systems
-Exit systems
- Electronic
- Mechanical
-Fire doors
-Cloud based
-Electronic locks & accessories
-Intercom systems
-Portals
- Biometric
- Programmable
- Pushbutton
-Visitor management systems
- Cloud-based
-Visitor management/tracking systems
-ID card systems
-ID cards
-Identity management systems
Section - Alarm systems - sensors, panels & systems
-Annunciators, lights
-Annunciators, sirens
-Annunciators, sounders
-Central station & remote monitoring equipment
- Remote controls with zone annunciation
- Remote release
- Reporting equipment
- Video verification equipment
-Control panels
- Arm/disarm stations
- I/O expanders
- Programmable remotely
- Remote stations
- Touch screen
- Wireless
- Zone expanders
-Miscellaneous alarm equipment
- Batteries
- Battery backup
- Cabinets & racks
-Power or environment sensors
- AC & UPS power failure protection
- Lightning protection devices
- Surge protection devices
-Radio communications
- Antennas
- Transmitters
-Remote monitoring
- GSM/cellular
-Buried sensors
-Infrared, active
-Infrared, passive (PIR)
-Loop detectors
-Motion detectors
-Photoelectric beam
-Proximity sensors
-Vehicle sensors, magnetic
-Beam protectors
-Contacts, door & window switches
-Continuity loops
- Door loops
- Electrical loops
- Window screens
-Emergency switches
-Frequency-tuned sensors
- Dual detection
- Glass-break sensors (on glass)
-Motion detectors
- Dual detectors
- Infrared, passive
- Microwave
- Photoelectric
- Video motion detectors
-Panic buttons
-Proximity sensor
Section - Communications equipment
-GSM cellular
-Intercoms
- Push-to-talk
- Standalone intercoms
- Talk-through communicators
- Telephone intercoms
- Videophone intercoms
-IP/network
-Repeaters
Section - IoT/IT security infrastructure
-Cables & fibres
-Connectors
-Enclosures, racks & consoles
- Cabinets - free-standing
- Cabinets - wall mounted
- Consoles - workstations, desk
- Racks & sub-racks
-Installation accessories
-Cabinets
-Communication security solutions
-Network hardware
Section - Other security equipment
-Control devices
-Fixtures
- Automatic operation (presence sensor)
- Infrared
-Floodlights
-Spotlights
-Strobe lights
Section - Perimeter security
-Fences, electric
- Controllers, electric fence
- Insulators, electric fence
- Low-voltage surveillance (with alarm)
- Non-lethal energiser system (with alarm)
-Outdoor wireless early warning alarm systems
-Gate automation, accessories
- Lightning protection
- Remote controls
- Safety beams
- Wireless transmitters/receivers/beams
-Gate automation/operators/motors
- Domestic slider
- Domestic swing
- Garage door automation
- Gate automation systems
- Gate operators, powered
- Industrial slider
- Industrial swing
-Gates
- Double swing
- Remote control
- Roller shutters
- Sliding
- Swinging
-Turnstiles
- Mechanical
Section - Physical security - locks, safes & containers
-Bolts, electronic
-Bolts, pneumatic
-Door holders, electronic
-Key switches
-Keypads
-Strikes, electronically released
-Timelocks, electronic
-Touchpads
-Door closers
-Door push & pull bars
-Locks
- Control systems
- Exit control
- Gate
- Keyless, pushbutton code
- Pushbutton
Section - Service providers
-Services offered
- Alarm monitoring
- Hosted services
- Video analytics
- Video management
- Video monitoring
-Technical focus
- Access control
- Asset management, EAS, RFID
- CCTV, surveillance
- Perimeter security, alarms & intruder detection
-Commercial
-Education
-Entertainment & hospitality
-Financial
-Government & parastatal
-Healthcare
-Residential estates
-Retail
-Safe city
-Warehousing
-Access control systems
- Access control systems
- Biometric systems
- Cloud-based/hosted systems
- ID badge & card services
- Visitor management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - domestic
- Market segment served - industrial/commercial
-Alarm Systems
- Video detection and/or verification
-Alarm systems
- Wireless
-Communications systems
- Network communications
- Video/audio intercom systems
- Wireless (incl. cellular)
-Locks and safes
- Electronic locks
-Perimeter security
- Electric fencing
- Gate & door automation
- Intruder detection (exterior)
- Parking barriers
- Vehicle detection
-Surveillance systems
- Remote monitoring
- Video analytics / AI analytics
- Video management systems
-Vehicle security systems
- Parking control systems
-Commercial
-Education
-Entertainment & hospitality
-Government & parastatal
-Healthcare
-Industrial & manufacturing
-Residential estates
-Retail
-Warehousing
Section - Surveillance equipment
-Consoles/enclosures for CCTV systems
-Housings, camera
- Domes/spheres/hemispheres
- Dust-proof
- Vandal-proof
- Weather-proof
-Lighting
- Fixtures
-Video monitors
-Video multiplexers
-Cables
-Connectors
-Enclosures
-Mounting brackets, accessories
-Video analytics
- AI-enhanced analytics
- On-camera
- Remote/cloud-based
-Video management systems (VMS)
Security news: |
The global state of physical security
January 2026, News & Events, Infrastructure, Genetec
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid. |
DeepAlert appoints Howard Harrison as CEO
January 2026, News & Events, AI & Data Analytics, DeepAlert
DeepAlert has appointed Howard Harrison as chief executive officer. DeepAlert’s founder and CEO of the past six years, Dr Jasper Horrell, will transition into a newly created role as chief innovation officer. |
The year of the agent
January 2026, Information Security, AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026. |
The year of machine deception
January 2026, Security Services & Risk Management, AI & Data Analytics
The AU10TIX Global Fraud Report, Signals for 2026, warns of the looming agentic AI and quantum risk, leading to a surge in adaptive, self-learning fraud, and outlines how early warning systems are fighting back. |
AI agent suite for control rooms
January 2026, Surveillance, News & Events, AI & Data Analytics, Milestone Systems
Visionplatform.ai announced the public launch of its new visionplatform.ai Agent Suite for Milestone XProtect, adding reasoning, context and assisted decision-making on top of existing video analytics and events — without sending video to the cloud. |
Check Point launches African Perspectives on Cybersecurity report
Issue 6 2025, Information Security, News & Events
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence |
Inaugural Command the Future event in Cape Town
Issue 6 2025, Perimeter Security, Alarms & Intruder Detection, News & Events, Gallagher
Gallagher Security Africa’s inaugural Command the Future 2025 event was a resounding success, reinforcing Gallagher’s commitment to innovation, collaboration, and long-term growth in Africa’s rapidly evolving security industry.
|
AI rewrites financial crime
Issue 6 2025, Security Services & Risk Management, Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.
|
| visit www.securitysa.com |
|
|
|
|
|