|
|
Transaction Control Technologies
187 Beyers Naudé Drive, Northcliff
Iso Certification ISO 9001:2015
Core business offering: Transaction Control Technologies specialises in security solutions, encompassing not only physical safeguarding but also operational safety, protecting the integrity of its customers’ businesses and mitigating losses with products such as CCTV and alarm systems. The company offers a wide variety of security systems and solutions to the corporate sector, retail environment, and homes.
|
|
Polokwane
|
Cape Town
|
|
Durban
|
Gqeberha
|
|
Johannesburg
|
| Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
| Shared Agency | This is one of several companies with official rights to distribute this brand |
| Sub Agency | This company purchases from an officially appointed local distributor |
| Manufacturer | This company manufactures this brand |
| Installer | This company is an approved installer or system integrator of this brand | |
Anti-Bandit
(Manufacturer, Installer) |
BB Lock
(Shared Agency, Installer) |
BEA (Belgium)
(Shared Agency) |
Dahua Technology
(Sub Agency, Installer) |
DSC
(Sub Agency) |
Hoyles (UK)
(Sole Agency) |
ID Teck (Korea)
(Shared Agency) |
Ingersoll Rand
(Shared Agency) |
Jarrison
(Sub Agency, Installer) |
Lockmaster
(Shared Agency, Installer) |
Paradox
(Sub Agency, Installer) |
Selector Door
(Manufacturer, Installer) |
SmokeCloak
(Sole Agency, Installer) |
Supra Traccess
(Sole Agency, Installer) |
Telecom Tube Systems
(Sole Agency, Installer) |
Trainer
(Sole Agency, Installer) |
Section - Access control & identity management
-Electronic locking systems
-Portals (mantraps)
-Security doors
Section - Alarm systems - sensors, panels & systems
-Control panels
- Wireless
- Zone expanders
Section - Fire protection products & systems
Section - Physical security - locks, safes & containers
-Key control equipment
-Key safes
-Cylinders
-Deadbolts
-Door closers
-Door holders, mechanical
-Door push & pull bars
-Emergency exit locks & alarms
-Locks
- Cam locks (high-security)
- Combination dial
- Control systems
- Door & window
- Exit control
- Gate
- Manhole cover
- Pushbutton
Section - Service providers
-Access Control as a Service (ACaaS)
-Access control systems
- Access control systems
- Biometric systems
- Cloud-based/hosted systems
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Visitor management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - domestic
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Wireless (incl. cellular)
-Locks and safes
- Electronic locks
- Mechanical locks
- Safes & strongrooms
-Perimeter security
- Burglar proofing
- Gate & door automation
- Intruder detection (exterior)
-Surveillance systems
- IP/analogue surveillance
- Video analytics / AI analytics
Section - Surveillance equipment
-Camera controls
- Pan/tilt/zoom (PTZ indoor)
- Pan/tilt/zoom (PTZ outdoor)
-Cameras
- Analogue
- Combination thermal & visual sensors
Cameras: Combination thermal & visual sensors
- Concealed, covert
- Fixed
Cameras: Fixed
- High definition (HD) - IP
- High definition (HD) analogue
- Infrared
- Low light
- Network/IP
-Lenses
- Fixed focal length
- Panoramic
- Special-purpose
- Varifocal
-Video recorders
- Digital video recorders (DVR)
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
| News from Transaction Control Technologies: |
Wireless access to remote sites
Access & Identity Management Handbook 2014, Access Control & Identity Management, Transaction Control Technologies
The Supra TRACcess system, available from Transaction Control Technologies (TCT), makes it possible to manage access control in sensitive widespread areas. The wireless system reduces the risks and expenses associated with managing physical keys. |
Cell C's comprehensive integrated approach
Access & Identity Management Handbook 2004, Integrated Solutions, Transaction Control Technologies
The history
Cell C is SA's third cellular network provider. After being awarded the third licence by ICASA in February 2001, when it employed only about 30 people, and launched in November 2001. In September ... |
Tips for retail security
March 2014, Retail (Industry), Transaction Control Technologies
Hi-Tech Security Solutions asked Malcolm Thomas, MD of Transaction Control Technologies (TCT) for some tips on how his company has advised and assisted different retailers in beating crime. |
Security news: |
2026 Industry Trends Report calls out security’s next opportunity
January 2026, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide. |
Five key technology trends for the security sector in 2026
January 2026, Surveillance, News & Events, Axis Communications SA
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant. |
Securing a South African healthcare network
January 2026, Surveillance, Healthcare (Industry), AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance. |
Axis signs CISA Secure by Design pledge
January 2026, Surveillance, Information Security, News & Events, Axis Communications SA
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products. |
AI cybersecurity predictions for 2026
January 2026, Information Security, AI & Data Analytics
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors. |
Identity-led security in banking
January 2026, Access Control & Identity Management, Products & Solutions, Secutel Technologies
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access. |
| visit www.securitysa.com |
|
|
|
|
|