04 Dec


We select our products from some of today’s leading equipment manufacturers. They are our trusted Technology Partners and a key aspect of our business. We choose these partners due to their excellent track record and their commitment to constant innovation. Their products offer unmatched business class functionality, reliability and management capability and thus deliver a high level of customer satisfaction, low business risk and a clear migration path.

Bosch Security Systems is an innovative, global, one-stop-shop for high-quality security and communication products.

From pioneer to leader in the security industry, Genetec has always been committed to providing the most innovative

Inner Range are world leaders in the design and manufacture of state of the art access control and security solutions.

Interlogix global security products represent leading security and fire solutions for both residential and commercial enterprises.

Axis is one of the market leader in network video and a driving force behind the shift from analog to digital video surveillance

The German company MOBOTIX AG is known as the leading pioneer in network camera technology and it’s decentralised

With thousands of installations spanning five continents, DVTEL is a world-class developer of video surveillance technologies

Arecont Vision is exclusively focused on megapixel technology and, as the industry leader, has contributed more to the advancement

Erint is a global leader in Actionable Intelligence solutions and value-added services. Their solutions capture, distill

With its own proprietary technology and product lines, Samsung Techwin is at the forefront of Samsung’s digital

Panasonic Security Solutions is an industry leader known for its video imaging expertise and innovative technology

Sony is taking the wraps off a comprehensive new approach to the Security industry. We’ve stepped up our game

With a long and prestigious history of offering high-quality, innovative products and exceptional customer service

Etrovision Technology is the industry leader in designing and marketing high-quality digital video products for both professional

04 Dec


CCTV Surveillance

Closed Circuit Television (CCTV) is widely used as a valuable tool to prevent crime and criminal damage, provide evidence of incidents, and more recently, video analytics including motion detection, left object (car or package for example), people counting and even facial recognition.

CCTV is used extensively by Councils, Police and Traffic controllers and most recently witnessed at the 2012 London Olympics where individuals have been arrested for throwing objects at and racially abusing athletes.

Images are usually recorded to disc and stored for a period of time and automatically overwritten in an automatic cycle. These images can also be viewed remotely (with a planned set of reactions depending on circumstances) and several sites can be linked to form one overall system. Camera types include conventional, dome, Pan Tilt & Zoom (PTZ) and covert. Most camera types are typically available in mega pixel format where enhanced image quality is paramount.

CCTV is also used extensively by commercial enterprises to protect the business’ physical environment, scan areas used by employees (to act as a deterrent for their safety and protection), and to generally detect all movement activity and audio (some of the cameras used by Sicoor have acute audio capacity).

The need for security and surveillance is unfortunately ever-increasing. There are strong arguments that the financial benefits of CCTV and an integrated security system far outweigh the costs of that system, particularly when one considers the potential cost associated with any one of the following, each of which can be significantly reduced or even eliminated with the appropriate security system:

Damage to property, assets, business interruption, and the resultant increase in insurance premiums and physical deterrents (fences, walls, guards, etc.) 

Damage to people, including physical, emotional, loss of confidence and the resultant issues emanating from OH&S claims, stress-related claims, loss of productivity, etc.

An inability to catch and/or prosecute the perpetrator/s, which would be eliminated with the use of appropriate CCTV’s preferably with audio capabilities

Some of the more typical installations in which Sicoor personnel have been involved include the following:

Identify shoplifters (with signage actually warning shoppers of the existence of cameras)

Monitoring employees at the cash registers, stock rooms, factory floors, restricted areas,

Monitoring car parking areas, common areas, entries/exits, sever rooms, gymnasiums, swimming pools, children’s playgrounds, school grounds and car pick-up areas, etc.

Some of the more critical issues that are assessed by the Sicoor team include the following:

What specifically is the camera/s trying to achieve – Sicoor then designs the tailored solution to meet the specific criteria

Will a response to the recorded activity be required, and if so, how, by whom and on what premise?

Will the recorded event be required for evidential purposes, and if so, what are the parameters – and then Sicoor  will ensure the appropriate technical specifications of the camera/s and its recording meet these objectives, including compliance with the Data Protection ActWhere precisely should the camera/s be located, and how will these be protected against malicious damage, weather conditions, vermin, etc.? Does the CCTV system require additional lighting to be effective, and is this system to be integrated with Access Control?

If you believe your security and/or that of your personnel is exposed please take action. It is far better to be safe now than sorry after the event. Too many times one hears the words of “…if only I had done something…”.Sicoor is waiting for your call, and we will provide you with a quotation at no cost to and with no obligation from you. You can then at least make an informed decision based on the facts.

Access Control

Access Control, Intrusion and Duress systems are offered as individual stand alone or as turnkey solutions. Access Control systems can feature swipe or proximity cards, biometric (fingerprint or iris), latest technology “air” keys, pin pads and even a combination of all. Sicoor systems are capable of controlling just one and up to tens of thousands of doors, areas, groups and users in a single or in multiple building installations.

Intrusion or alarm devices such as Passive Infrared Detectors (PIR’s), door contacts, glass break detection, perimeter photo-optical beams, seismic (safe) sensors, duress, smoke detection and sirens can be interfaced into an Access Control system or installed as a separate standalone system. Similar to Access Control, a standalone intrusion system can consist of one and upwards of thousands of devices. In accordance with AS2201 each device reports to a dedicated zone within the system so that its unique location can be identified immediately.

The purpose of an Access Control System includes the following:

Control who enters your premises and when (and thereby deny entry to those whom are not welcome) 

Secure a particular area of your business or site.

Observe and record movement (and this system essentially saves on continuous monitoring as the system is activated only when and if there is movement)

Protect the business, its assets, people and information

Reduce the costs of damage & loss (assets, property, people, and information)

Be scalable to accommodate future growth in the business, and within reason, future technological advancements

Reduce potential litigation against you and/or your business should your security systems be suspect and human injury (or worse) is sustained as a result

The Sicoor Access Control Systems provide an ability to tailor a solution based on your specific needs. We will analyse and discuss these needs with you first, and then design the ultimate solution based on those needs, your budget, but also bearing in mind scalability. The costs may be surprisingly low depending on the system, with the following impacting both price and complexity:

Size of system (itself based on size or organisation, area/s occupied, number of employees, etc.)

Level of automation and sophistication

Number of systems to be integrated

Distance between sites (if more than one site)

Internet access and speed required

You will note in the text above the use of several technological facilities, and we explain these below:


This refers to the science of verifying a person’s identity through automatic recognition means, measuring pre-determined characteristics of each person. Two of the most common tools (and you may have seen these used in movies) relate to a fingerprint scan, which recognises the fingerprint of the individual and the iris scan, where you look into the lens that will identify you by your iris. These are very effective systems and are not easily fooled so in almost all situations are regarded as full-proof

Alarm Devices:

There are various levels of sophistication in relation to alarms, and in particular what triggers the alarm. Sicoor can incorporate several ‘triggers’ including movement (indoor and/or outdoor), (specific) door/s opening, (specific) window/s breaking, safe sensors, smoke detectors, etc. A fully integrated alarm system can incorporate some or all of the above into one system, all essentially controlling access to specified areas and reporting (via the alarm) when a security breach occurs.

Integrated Solutions:

What this means is that Sicoor has the capacity to merge all of your security and surveillance systems (as well as systems covering building maintenance – managing things like lighting, air-conditioning, heating, UPS, etc., within the office environment and being able to, for example, switch these on and off remotely) into one manageable solution, with varying degrees of reporting, recording and access. Some of these may be accessible via the web, enabling you to review at any time, while others are based on ‘reaction’ where the triggering of an alarm is the call to action (and where that ‘action’ must be defined and planned).

Audio/Video Intercommunications

Our intercom systems are capable of interfacing with our CCTV surveillance systems or can be standalone. A system may be audio, or a combination of both audio and video.

Our types of systems include basic one entry to one internal station to those consisting of multiple entries and handsets for all sizes of apartment and commercial buildings.

In addition, our higher end solutions are capable of automatically diverting to a preset phone number or via IP/VOIP for remote response. It is even possible to remotely unlock doors attached to the intercom system off site.

The Sicoor capabilities include all forms of telephony, internet provision, VoIP facilities and these can be integrated into the other security and/or access control systems.

Sicoor will design, install and maintain a tailored solution based on your specific requirements, as depending on the nature of the property, requirements can vary considerably.

04 Dec

Data Storage & Security


Visitors are then required to use the biometric hand scanners and a security code to gain access to the customer service area which is manned 7x24x365.
All equipment entering and leaving the data center is checked for serial numbers and descriptions and verified against the visitors file in the computer system. This hands-on approach to security is much more effective than data centers that allow customers to come and go unsupervised.

Fire Detection & Suppression
Fire detection is provided by a facility-wide Very Early Warning Aspirating Smoke Detection System (VESDA). Each of the 30 CRAC units has its own detection monitor that is also connected to the VESDA system. Monitored both onsite and remotely, the VESDA units are but one piece of the Triple Interlock, Pre-Action fire detection and suppression system.

Data Storage & Security
Sicoor utilizes highly redundant storage technologies combined with proactive monitoring to insure data availability. Failure of redundant components can be detected and repaired before any interruption in service occurs.

All customer data runs on back-end servers that connect to a Storage Area Network (SAN). This architecture is redundant in nearly every aspect and allows us to seamlessly add additional capacity as needed without causing downtime to existing customers

Data Backup
Sicoor backs up all files nightly to Network Attached Storage (NAS) that can take incremental snapshots every 15 minutes. Disaster recovery is achieved with the ability to virtualize a failed server in the case of a catastrophic failure.

Should the need arise, Help Desk engineers can quickly locate the file that needs to be restored and “drag and drop” the file back to the requested location.

Network Security
Our network security begins with redundant security appliances that provide multi-layer protection from attacks, worms, spyware, viruses, and other forms of malware, creating a firewall that stops attacks before our network. We closely monitor network security to ensure maximum protection and availability of the network and its services.

Spam and Virus Protection
Sicoor provides world-class anti-virus and anti-spam protection via Postini with 98% or better accuracy in blocking spam and viruses using exclusive Preemptive Email Protection Technology (preEMPT).

Security, Redundancy, Protection
As an integral part of our infrastructure, we provide a resilient, secure, and high performance environment making sure our equipment is redundant and housed in an optimal infrastructure while monitoring every step of the process 24X7.

04 Dec


Cloud Virtual Machine (VM)

Dedicated virtual servers will reside on enterprise cloud infrastructure delivering the resources required to power your business applications. All testing, staging and

Production servers can scale within minutes. We will provide administrator access to your application vendors so they are able to effectively manage, monitor and support your business applications.


The solution is completely elastic meaning it can scale exponentially to accommodate your changing infrastructure needs. Sicoor will protect you from failure by providing the expertise and support to manage your network design, security and growth adhering to all of the agreed service levels.

Infrastructure as a service (IaaS)

Infrastructure as a Service is a provision model in which an organization outsources the equipment used to support operations, including storage, hardware, servers and networking components. The service provider owns the equipment and is responsible for housing, running and maintaining it. The client typically pays on a per-use basis.

Characteristics and components of IaaS include:

  • Utility computing service and billing model.
  • Automation of administrative tasks.
  • Dynamic scaling.
  • Desktop virtualization.
  • Policy-based services.
  • Internet connectivity.

IaaS is one of three main categories of cloud computing service. The other two are Software as a Service (SaaS) and Platform as a Service (PaaS).

Infrastructure as a Service is sometimes referred to as Hardware as a Service (HaaS).

Hosted Backup & Disaster Recovery

Special Backup and Disaster Recovery offer for customers of Citrix XenServer

(formerly QuorumSoft) has created a special discount program to help existing customers of Citrix XenServer address the significant changes in XenServer 6.2. Because these sweeping changes in XenServer 6.2 include deprecating the backup features within the VMPR (Virtual Machine Protection and Recovery) feature set, Quadric Software is providing an upgrade path for all current XenServer customers.
With this new program, existing XenServer customers can get special discounts on Alike, the industry-leading Backup and Disaster Recovery solution. When you upgrade to Alike, you’ll get all the features of VMPR, plus much more like:

  • Support for Microsoft Hyper-V and XenServer, from a single installation
  • Protection for both virtual and physical infrastructure (beta)
  • Unmatched global deduplication, instant file level restore, robust VM replication

Hosted Email

High performance, low-cost email service tailored specifically for the needs of service providers

A competitive email service leads to loyal customers, and increased sales of additional services. Email Service allows you to offer email with a feature-set that is competitive with other popular email services. OpenSRS Email Services provides solid reliability and excellent deliverability, along with a feature-rich webmail application.

Email Service features

  • Industry-standard POP3, IMAP, WAP (mobile) and Webmail access.
  • Fully-localized Webmail in English, French, Spanish, German, Dutch, Italian, Portuguese, Swedish, Norwegian, and Danish.
  • Complete spam and virus protection for both inbound and outbound mail to protect your customers from threats.
  • 5GB of storage with the ability to send large attachments thanks to a generous 35MB message size allowance.

Cloud Desktop

Cloud Desktop will enable your users to securely access a Microsoft virtual desktop session via Citrix. The desktop includes access to the Microsoft Office suite, all of your corporate applications, email and data. Users will login via the client installed on their device or through a secure web portal – it’s that simple!

Automated provisioning of desktops and applications will allow you to quickly add users, customising their preferences and application access in minutes. Multiple user profiles will be stored to manage your standard operating environment and desktop fleet efficiently.



The solution provides a turn-key environment for your business to grow, delivering fast, and integrated IT systems for future offices or new business acquisitions. Simple per user, per month pricing with recurring capital investment.

  • Improved performance for branch offices and remote staff
  • Access to the latest versions of software from day one
  • Shared network data storage and printing
  • IT system and data backup, disaster recovery and compliance management
  • built-in Full support, maintenance and management of IT systems
  • Flexible service, scale up or down with minimal contract terms