|
Transaction Control Technologies
187 Beyers Naudé Drive, Northcliff
Iso Certification ISO 9001:2015
Core business offering: Transaction Control Technologies specialises in security solutions, not only physical safeguarding, but also the safety of operations, protecting the integrity of its customers’ businesses and curbing losses with products including CCTV and alarm systems. The company offers a wide variety of security systems and solutions to the corporate sector, retail environment, and homes.
|
Polokwane
|
Cape Town
|
Durban
|
Port Elizabeth
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
Anti-Bandit
(Manufacturer, Installer) |
BB Lock
(Shared Agency, Installer) |
BEA (Belgium)
(Shared Agency) |
Dahua Technology
(Sub Agency, Installer) |
DSC
(Sub Agency) |
Hoyles (UK)
(Sole Agency) |
ID Teck (Korea)
(Shared Agency) |
Ingersoll Rand
(Shared Agency) |
Jarrison
(Sub Agency, Installer) |
Lockmaster
(Shared Agency, Installer) |
Paradox
(Sub Agency, Installer) |
Selector Door
(Manufacturer, Installer) |
SmokeCloak
(Sole Agency, Installer) |
Supra Traccess
(Sole Agency, Installer) |
Telecom Tube Systems
(Sole Agency, Installer) |
Trainer
(Sole Agency, Installer) |
Section - Access control & identity management
-Electronic locking systems
-Portals (mantraps)
-Security doors
Section - Alarm systems - sensors, panels & systems
-Control panels
- Wireless
- Zone expanders
Section - Fire protection products & systems
Section - Physical security - locks, safes & containers
-Key control equipment
-Key safes
-Cylinders
-Deadbolts
-Door closers
-Door holders, mechanical
-Door push & pull bars
-Emergency exit locks & alarms
-Locks
- Cam locks (high-security)
- Combination dial
- Control systems
- Door & window
- Exit control
- Gate
- Manhole cover
- Pushbutton
Section - Service providers
-Access Control as a Service (ACaaS)
-Access control systems
- Access control systems
- Biometric systems
- Cloud-based/hosted systems
- Personnel booths & mantraps
- Revolving doors & turnstiles
- Visitor management systems
-Alarm systems
- Intruder detection, exterior (perimeter)
- Intruder detection, interior & building
- Market segment served - domestic
- Market segment served - industrial/commercial
- Wireless
-Communications systems
- Wireless (incl. cellular)
-Locks and safes
- Electronic locks
- Mechanical locks
- Safes & strongrooms
-Perimeter security
- Burglar proofing
- Gate & door automation
- Intruder detection (exterior)
-Surveillance systems
- IP/analogue surveillance
- Video analytics / AI analytics
Section - Surveillance equipment
-Camera controls
- Pan/tilt/zoom (PTZ indoor)
- Pan/tilt/zoom (PTZ outdoor)
-Cameras
- Analogue
- Combination thermal & visual sensors
Cameras: Combination thermal & visual sensors
- Concealed, covert
- Fixed
Cameras: Fixed
- High definition (HD) - IP
- High definition (HD) analogue
- Infrared
- Low light
- Network/IP
-Lenses
- Fixed focal length
- Panoramic
- Special-purpose
- Varifocal
-Video recorders
- Digital video recorders (DVR)
- Hybrid video recorders (XVR)
- Network video recorders (NVR)
News from Transaction Control Technologies: |
Wireless access to remote sites
Access & Identity Management Handbook 2014, Access Control & Identity Management, Transaction Control Technologies
The Supra TRACcess system, available from Transaction Control Technologies (TCT), makes it possible to manage access control in sensitive widespread areas. The wireless system reduces the risks and expenses associated with managing physical keys. |
Cell C's comprehensive integrated approach
Access & Identity Management Handbook 2004, Integrated Solutions, Transaction Control Technologies
The history
Cell C is SA's third cellular network provider. After being awarded the third licence by ICASA in February 2001, when it employed only about 30 people, and launched in November 2001. In September ... |
Tips for retail security
March 2014, Retail (Industry), Transaction Control Technologies
Hi-Tech Security Solutions asked Malcolm Thomas, MD of Transaction Control Technologies (TCT) for some tips on how his company has advised and assisted different retailers in beating crime. |
Security news: |
SA businesses embrace GenAI, but strategy and skills lag
Issue 3 2025, News & Events, AI & Data Analytics
South African enterprises are rapidly integrating Generative AI (GenAI) into their operations, but most are doing so without formal strategies, dedicated leadership, or the infrastructure required to maximise value and minimise risk. |
Acronis and Metrofile Cloud announce partnership
Issue 3 2025, Integrated Solutions, Infrastructure
Acronis has appointed Metrofile Cloud as its premier disaster recovery (DR) partner in southern Africa, combining Acronis' technologies with Metrofile Cloud's local expertise to deliver secure and adaptable disaster recovery solutions for businesses across the region. |
Can AI improve operational challenges?
Issue 3 2025, Industrial (Industry), AI & Data Analytics
AI offers local manufacturers an answer to a growing list of operational challenges. The increasing sophistication of AI solutions could not come at a better time for South African manufacturers, who are grappling with declining sales and the uncertainty of global trade. |
Eagle Eye Precision Person & Vehicle Detection
Issue 3 2025, Surveillance, Products & Solutions, AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders |
Corporate and academic teams can register for Kaspersky contest
Issue 3 2025, Information Security, News & Events, Kaspersky
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation. |
FICA in the era of deepfake and AI-driven fraud
Issue 3 2025, Security Services & Risk Management
A growing fraud strategy involves leveraging AI to produce highly convincing fake images, videos, and audio, commonly referred to as deepfakes, which are used to impersonate real individuals and spread misleading or false information. |
visit www.securitysa.com |
|
|
|
|
|