-
Hi-Tech Security Business Directory (HSBD)
ITgility

Building 1,Waterfall Point Office Park, cnr Woodmead & Maxwell Drive, Midrand

tel:  
+27 11 805 1402
email:  
[email protected]
url:  
www.itgility.co.za

Core business offering: ITgility has experts in business, technology, and industry who leverage modern and advanced technology to help organisations reduce risk, meet compliance, and boost market response. It also aims to assist organisations in creating new revenue streams by mining and deriving intelligence from company data. The framework for a highly secure, trusted, and scalable infrastructure ready for artificial intelligence and hybrid cloud is essential for modern data centres and businesses.


Mokoena, Thandiwe
Sales
[email protected]
Pillay, Envor
Sales
[email protected]
Swanevelder, Jacques
Technical
[email protected]
Amazon Web Services
(Sub Agency)
Cisco
(Sub Agency)
Commvault
(Sub Agency)
Dell Technologies
(Sub Agency)
Fortinet
(Sub Agency)
Hitachi
(Sub Agency)
HPE
(Sub Agency)
IBM
(Sub Agency)
McAfee
(Sub Agency)
Nutanix
(Sub Agency)
Sophos
(Sub Agency)
Splunk
(Sub Agency)
Symantec
(Sub Agency)
Trend Micro
(Sub Agency)
VEEAM
(Sub Agency)
VMware
(Sub Agency)
Section - IoT/IT security infrastructure
-Cables & fibres
-Enclosures, racks & consoles
- Cabinets - free-standing
- Consoles - workstations, desk
- Racks & sub-racks
-Computers & accessories
-Encryption hardware
-Network security appliance
-Secure storage media
- Hard drive
- Magnetic tape & cassette
- Optical media
- Removable media
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Encryption s/w
-Firewalls
-IoT/Edge security s/w
-Network security s/w
-Security info & event management platforms (SIEM)
-Data centre equipment
-Racks & enclosures
-Network security
-Vulnerability assessments & penetration testing
-BYOD solutions
-Consoles - workstations, desk
-Edge security solutions
-Network management s/w
-Network optimisation
-Network security solutions
-Other networking equipment
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
-LAN/WAN solutions
-Network management solutions
-Routers
-Switches
-Telephony/CTI/VOIP
-Cybersecurity products
-Cybersecurity services
-Installation/integration services
-Integrated solutions
-Networking & communications
-E-mail archiving solutions
-Hard drives
-RAID controllers/adaptors
-SAN/NAS
-Solid-state disks
-Storage management
- Backup/recovery
- Clustering
- Security
- Storage management
Section - Service providers
-Disaster recovery services
-Technical focus
- IT infrastructure
-Backup & recovery
-Business continuity services
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
-Security as a Service
-Video Surveillance as a Service (VSaaS)
News from ITgility:
Optimising video across the WAN
CCTV Handbook 2012, Surveillance, ITgility

Real-time applications, like video surveillance, video streaming and video conferencing currently account for over 30% of worldwide typical enterprise’s application mix. These applications behave differently than traditional enterprise applications like file, e-mail and Web services - especially when used across a wide area network (WAN).

Security news:
Seven tips to help ensure your backup batteries work
Issue 2 2025, Security Services & Risk Management, Power Management

Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Standards for fire detection
Issue 2 2025, Fire & Safety

Nick Collins discusses standards for commissioning and handing over a fire project once the installation is complete.

Milestone announces a platform to enable access to data and train AI models
Issue 2 2025, Surveillance, AI & Data Analytics

Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Stallion repositions itself as a services provider
Issue 2 2025, News & Events, Security Services & Risk Management

Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

The role of advanced technologies in ransomware recovery
Issue 2 2025, Information Security

As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Gallagher Security expands Digital Badge Programme
Issue 2 2025, Access Control & Identity Management, News & Events, Training & Education

Following a successful launch and roll out across Australia and Papua New Guinea in 2023, Gallagher announced its Digital Badge programme is now available to channel partners and end users across the rest of APAC IMEA.

Kaspersky KATA 7.0 for targeted attack protection
Issue 2 2025, Information Security, Products & Solutions

] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Integrated Control Technology and Ingram Micro sign distribution agreement
Issue 2 2025, Access Control & Identity Management, News & Events

Integrated Control Technology, a global manufacturer of intelligent electronic access control and security solutions, announced it has extended its presence in the Middle East and Africa region by entering a distribution agreement with Ingram Micro.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.