-
Hi-Tech Security Business Directory (HSBD)
Transaction Control Technologies

187 Beyers Naudé Drive, Northcliff

tel:  
+27 11 888 1210
cell:  
0861 SMOKEM
email:  
[email protected]
url:  
www.tct.co.za

Iso Certification ISO 9001:2015

Core business offering: Transaction Control Technologies specialises in security solutions, not only physical safeguarding, but also the safety of operations, protecting the integrity of its customers’ businesses and curbing losses with products including CCTV and alarm systems. The company offers a wide variety of security systems and solutions to the corporate sector, retail environment, and homes.


Polokwane

tel: +27 11 888 1210
[email protected]
Cape Town

tel: +27 11 888 1210
[email protected]
Durban

tel: +27 11 888 1210
[email protected]
Port Elizabeth

tel: +27 11 888 1210
[email protected]
DeVilliers, Dirk
Project Coordinator
[email protected]
Leach, Martin
Sales Consultant
[email protected]
Moneram, Kamal
Technical Manager
[email protected]
Mphahlele, Lawrence
Service Supervisor
[email protected]
Nkuna, Carl
Sales
[email protected]
Thomas, M.W.
Managing Director
[email protected]
Thomas, Darren
Director: New Business Development
[email protected]
Xaba, Catherine
Sales Executive
[email protected]
Anti-Bandit
(Manufacturer, Installer)
BB Lock
(Shared Agency, Installer)
BEA (Belgium)
(Shared Agency)
Dahua Technology
(Sub Agency, Installer)
DSC
(Sub Agency)
Hoyles (UK)
(Sole Agency)
ID Teck (Korea)
(Shared Agency)
Ingersoll Rand
(Shared Agency)
Jarrison
(Sub Agency, Installer)
Lockmaster
(Shared Agency, Installer)
Paradox
(Sub Agency, Installer)
Selector Door
(Manufacturer, Installer)
SmokeCloak
(Sole Agency, Installer)
Supra Traccess
(Sole Agency, Installer)
Telecom Tube Systems
(Sole Agency, Installer)
Trainer
(Sole Agency, Installer)
Section - Access control & identity management
-Electronic locking systems
-Portals (mantraps)
-Security doors
Section - Alarm systems - sensors, panels & systems
-Control panels
- Wireless
- Zone expanders
Section - Fire protection products & systems
-Strobe lights
Section - Physical security - locks, safes & containers
-Key control equipment
-Key safes
-Cylinders
-Deadbolts
-Door closers
-Door holders, mechanical
-Door push & pull bars
-Emergency exit locks & alarms
-Locks
- Cam locks (high-security)
- Combination dial
- Control systems
- Door & window
- Exit control
- Gate
- Manhole cover
- Pushbutton
Section - Service providers
-Access Control as a Service (ACaaS)
-Access control systems
- Access control systems
- Biometric systems
- Cloud-based/hosted systems
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Visitor management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - domestic
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Wireless (incl. cellular)
-Locks and safes
- Electronic locks
- Mechanical locks
- Safes & strongrooms
-Perimeter security
- Burglar proofing
- Gate & door automation
- Intruder detection (exterior)
-Surveillance systems
- IP/analogue surveillance
- Video analytics / AI analytics
Section - Surveillance equipment
-Camera controls
- Pan/tilt/zoom (PTZ indoor)
- Pan/tilt/zoom (PTZ outdoor)
-Cameras
- Analogue
- Combination thermal & visual sensors Cameras: Combination thermal & visual sensors
- Concealed, covert
- Fixed Cameras: Fixed
- High definition (HD) - IP
- High definition (HD) analogue
- Infrared
- Low light
- Network/IP
-Lenses
- Fixed focal length
- Panoramic
- Special-purpose
- Varifocal
-Video recorders
- Digital video recorders (DVR)
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
News from Transaction Control Technologies:
Wireless access to remote sites
Access & Identity Management Handbook 2014, Access Control & Identity Management, Transaction Control Technologies

The Supra TRACcess system, available from Transaction Control Technologies (TCT), makes it possible to manage access control in sensitive widespread areas. The wireless system reduces the risks and expenses associated with managing physical keys.

Cell C's comprehensive integrated approach
Access & Identity Management Handbook 2004, Integrated Solutions, Transaction Control Technologies

The history Cell C is SA's third cellular network provider. After being awarded the third licence by ICASA in February 2001, when it employed only about 30 people, and launched in November 2001. In September ...

Tips for retail security
March 2014, Retail (Industry), Transaction Control Technologies

Hi-Tech Security Solutions asked Malcolm Thomas, MD of Transaction Control Technologies (TCT) for some tips on how his company has advised and assisted different retailers in beating crime.

Security news:
SA businesses embrace GenAI, but strategy and skills lag
Issue 3 2025, News & Events, AI & Data Analytics

South African enterprises are rapidly integrating Generative AI (GenAI) into their operations, but most are doing so without formal strategies, dedicated leadership, or the infrastructure required to maximise value and minimise risk.

Acronis and Metrofile Cloud announce partnership
Issue 3 2025, Integrated Solutions, Infrastructure

Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region.

Can AI improve operational challenges?
Issue 3 2025, Industrial (Industry), AI & Data Analytics

AI offers local manufacturers an answer to a growing list of operational challenges. The increasing sophistication of AI solutions could not come at a better time for South African manufacturers, who are grappling with declining sales and the uncertainty of global trade.

Eagle Eye Precision Person & Vehicle Detection
Issue 3 2025, Surveillance, Products & Solutions, AI & Data Analytics

Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Corporate and academic teams can register for Kaspersky contest
Issue 3 2025, Information Security, News & Events, Kaspersky

Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

FICA in the era of deepfake and AI-driven fraud
Issue 3 2025, Security Services & Risk Management

A growing fraud strategy involves leveraging AI to produce highly convincing fake images, videos, and audio, commonly referred to as deepfakes, which are used to impersonate real individuals and spread misleading or false information.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.