|
Excellent ID
127 Marico Avenue, Sinoville
Core business offering: Excellent ID provides clients with a comprehensive visitor management data capture solution that replaces the traditional visitor book. The company also assists VARs by offering SADL decoding, enabling them to introduce their solutions to clients. Additionally, Excellent ID offers an OEM module that clients can utilise with third-party access control terminals.
|
Bartrans |
Gauteng
tel: +27 11 552 8245
fax: +27 11 397 8526
|
Compliance Verification Solutions |
Gauteng
tel: +27 11 848 4900
fax: +27 83 307 4956
|
Elvey Security |
Edenvale
tel: +27 11 401 6700
|
G4S Secure Solutions |
Pretoria
tel: +27 10 011 4500
|
Gallagher |
Edenvale
tel: +27 11 974 4740
|
IBO-DATA |
Gauteng
tel: +27 11 793 2784
fax: +27 82 777 7436
|
NAASA |
Gauteng
tel: +27 11 868 1781
fax: +27 11 868 1781
|
Sole Agency | This company has been granted exclusive distribution rights by this brand's owner |
Shared Agency | This is one of several companies with official rights to distribute this brand |
Sub Agency | This company purchases from an officially appointed local distributor |
Manufacturer | This company manufactures this brand |
Installer | This company is an approved installer or system integrator of this brand | |
eSkan
(Manufacturer) |
Futronic
(Sub Agency) |
HID Global
(Sub Agency) |
Honeywell
(Sub Agency) |
Zebra
(Sub Agency) |
Section - Access control & identity management
-ID cards
-Identity management systems
News from Excellent ID: |
Identifying good visitor management practices
Access & Identity Management Handbook 2019, Access Control & Identity Management, Asset Management, Excellent ID
There are a number of factors that security managers need to consider when implementing visitor management and access control protocols. |
Leaving the paper trail behind
Residential Estate Security Handbook 2018, Access Control & Identity Management, Asset Management, Excellent ID
Shaun van Tonder of EXID discusses transitioning from the unreliable visitor book to South African Driver’s Licence scanner technology to manage visitors to your estate. |
2D barcode scanners
November 2018, Access Control & Identity Management, Products & Solutions, Excellent ID
The latest-generation eSkan 2D barcode scanner from EXID includes a touchscreen that enables users to manually enter additional details. |
EXID’s Dolphin CT50
October 2018, Asset Management, Products & Solutions, Excellent ID
The Dolphin CT50 is Honeywell’s most advanced enterprise-ready 4G/LTE mobile computer for enterprises that require anywhere, anytime, real-time connectivity. |
Controlling visitor access on mines
October 2018, Access Control & Identity Management, Mining (Industry), Products & Solutions, Excellent ID
Visitors to mining facilities, quarries and processing plants need to be carefully screened to ensure that their entry into the premises is valid. |
Security news: |
SMARTpod talks to Armata’s Richard Frost
December 2024, Videos, Technews Publishing, SMART Security Solutions
SMARTpod, the podcast by SMART Security Solutions, recently spoke to Richard Frost from Armata about the company's new 'all-in-one' cybersecurity bundle designed to relieve cyber stress in the SMB market. |
Here’s to a SMART 2025
December 2024, News & Events, Editor's Choice, SMART Security Solutions
This is the final news brief from SMART Security Solutions for 2024, and the teams would like to take this opportunity to thank our readers, advertisers and partners and wish everyone a safe and secure festive season. |
Standards for fire detection
December 2024, Fire & Safety, SAQCC (Fire)
In the second article from SAQCC, Nick Collins focuses on SANS 10139, which is generally regarded as the “Book of Knowledge” for any fire detection installer, commissioner and designer. |
Risk-IO manages mining security risks
December 2024, Security Services & Risk Management, Mining (Industry)
[Sponsored] A local mining company with three large operations experienced increased security costs. The liability included no standardised risk assessment, poor management of the efforts to mitigate hazards, and unauthorised access with subsequent theft. The reactive approach to security was not only expensive but also wasteful in the sense that the costs were poorly managed, and there were no metrics to show improvement or trends in incidents. |
visit www.securitysa.com |
|
|
|
|
|