Company type
Location
All Categories (A - Z)

Directory

A10
Click to explore
A10 provides high-performance detection and prevention against DDoS and protocol attacks. Since the A10 Thunder and AX Series ADCs are placed between the...
 

Click to explore
Come and advertise your company here! Click the link below to be taken to our registration page where you can sign up for our free Leopard package....
 

Click to explore
PERSISTENCE TECHNOLOGY Patented Persistence® technology from Absolute provides customers with visibility and control over all of their devices,...
 

Click to explore
Exclusive distributors of Zscaler in Sub-saharan Africa
 

Click to explore
Enterprise Content Firewall Protect Sensitive Information from 3rd Party Cyber Risk CONSOLIDATE COMMUNICATIONS Consolidate and Control 3rd Party...
 

Click to explore
BUSINESS DRIVEN SECURITY MANAGEMENT Discover, map and migrate business application connectivity to the cloud Proactively analyze security risk from the...
 

Click to explore
Anomali helps organizations find and respond to cyber threats. With Anomali you can now identify suspicious or malicious traffic before it even reaches your...
 

Click to explore
Malware detection. Multi-Layer Ransomware Protection. Zero System Slowdowns. Webcam Protection. Automatic Upgrades. From IoT to Data Centres, from endpoints...
 

Click to explore
CONDYN has been serving the Africa continent with Information Security Solutions that now includes Fraud, Risk and compliance solutions. Our solutions is...
 

Click to explore
Cyber Security South-Africa (CSSA)  is an industry-leading, Cyber Security Technology Distributor, backed by globally recognised international...
 

Click to explore
Attackers spend an average of 99 days inside your systems undetected. Their target? Unsecured privileged accounts and credentials giving them access to your...
 

Click to explore
We are rewriting the rules on how organisations protect themselves against rapidly evolving adversaries. Today’s threat environment requires understanding...
 

Click to explore
Deloitte Cyber helps organisations create a cyber-minded culture and become stronger, faster, more innovative and more resilient in the face of persistent...
 

Click to explore
What's DeskAlerts Alerting Software? DeskAlerts Alerting Software is a special system that allows for the transmission of information to a large number...
 

Click to explore
We are all about performance, and how to get every last drop out of your existing hardware. Increasing the longevity of your current IT Equipment primarily...
 

Click to explore
The International Council of Electronic Commerce Consultants (EC-Council) is a professional organization that certifies individuals in various e-business...
 

Click to explore
Elliptic Consulting is an internet security consultancy and services provider that specialises in: Security Policy Development Software Auditing and Code...
 

Click to explore
ellipticSecure provides general purpose PKCS#11 compliant HSMs and FIDO2 Hardware Security Keys to small and medium enterprises in order to protect...
 

Click to explore
Project Management Office (PMO) • PMO Management (Outsourced) • IT Strategy alignment to Corporate strategy • SAP Green, Brown and Blue fields...
 

Click to explore
Executive Solutions, is a managed services provider (MSP), delivering technology support, infrastructure and security services to businesses of all sizes....
 

Click to explore
Group-IB has been pioneering incident response and cybercrime investigation practices since 2003. This experience and understanding of threat actors’...
 

Click to explore
We represent the Siemens Ruggedcom Portfolio. Specialising in Industrial Communications and Cyber Security for power grids and organisations running...
 

Click to explore
We specialize in cyber-security solutions across different industry verticals. Our core value proposition is our ability to deliver robust, transformative...
 

Click to explore
ABOUT IKUSASA TECHNOLOGY SOLUTIONS IKUSASA Technology Solutions (Ikusasa) is a company providing Information and Communication Technology (ICT) training...
 

ISM
Click to explore
ISM was established in 2005 as a fully integrated IT solutions and services provider. We deliver cutting edge solutions based on the latest technologies to...
 

Click to explore
About LAWtrust LAWtrust is Africa’s leading trust centre, security integrator and security solutions developer. In short, what that means is we provide...
 

Click to explore
Legal Compliance Consulting, Information Security Consulting, Cyber Security Consulting, Labour Consulting Services and Training Seminars
 

Click to explore
Nclose is an international cybersecurity defence, offence and protection specialist based in South Africa. Through a combination of a class-leading global...
 

Click to explore
Networks Unlimited is a value-added distributor, committed to empowering African businesses through innovative technology solutions. Our focus includes the...
 

Click to explore
About Obashi Obashi is the world-leading data flow expert and its co-founders have written the fundamental laws and principles around the control,...
 

Click to explore
About OneTrust OneTrust technology powers privacy, security and data governance programs. More than 6,000 customers use OneTrust to build integrated...
 

Click to explore
Paresco Solutions is founded on the premise of the Pareto principal (20%-80%) and provide services and solutions that aligns risk and maturity with...
 

Click to explore
PRIVATE PROTOCOL REPRESENTS AND DISTRIBUTES THE “BEST-OF-BREED” DATA PROTECTION SOLUTIONS FOR AFRICA AND INDIAN OCEAN ISLANDS.  With the ever...
 

Click to explore
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130...
 

Click to explore
About Quantalytics Quantalytics is a 30 years old network and systems integration firm which offers superior state of the art network security solutions....
 

Click to explore
With Rapid7, technology professionals gain the clarity, command, and confidence to safely drive innovation and protect against risk. We transform your data...
 

Click to explore
RIAL is a young and dynamic company specializing in advanced Cyber Security solutions and services for the Government and Law Enforcement agencies in Africa...
 

Click to explore
At RS Technology Solutions we believe that technology should support and enhance your organization’s success, not constrain it. With our wide range of...
 

Click to explore
RUBIQ is a smart on line Cloud Platform, offering any client a structured, assisted journey to understanding and meeting IT Governance, Cyber Risk,...
 

Click to explore
SPREADSHEET AUTOMATION SYSTEMS INTEGRATION SOFTWARE DEVELOPMENT BUSINESS PROCESS RE-ENGINEERING ANALYTICS/REPORT DEVELOPMENT WEBSITE DEVELOPMENT
 

Click to explore
About Sendmarc offers protection against email spoofing and impersonation. Our core mission is to safe guard your company, staff, customers, suppliers...
 

Click to explore
Cyber Security Advisory Forensic Investigations Digital Forensics
 

Click to explore
At Sillifant IT Services our mission is to offer IT support that is second to none. We pride ourselves in a company where professionalism permeates every...
 

Click to explore
Introducing the Next Generation of Multi Factor Authentication. Silverfort delivers strong authentication across entire corporate networks and cloud...
 

Click to explore
We provide email and communication services to our clients
 

Click to explore
We help establish organizational resilience through integrated risk & compliance strategies  Our Approach is to simplify our consulting and...
 

Click to explore

Techtron® Azure Sentinel Managed Services allows companies to address the increasingly complex security requirements for both cloud and on premise services, using Azure Sentinel a modern SIEM from Microsoft.

 

Click to explore
Specialised data recovery, forensic data recovery, digital forensic investigations and OSINT from almost all types of digital data storage devices and...
 

Click to explore
TITUS solutions enable organizations to discover, classify, protect, confidently share information and meet regulatory compliance requirements by...
 

Click to explore
We are a team of dedicated professionals whose main goal is to help our clients strengthen their cybersecurity posture in order to protect their business...
 

VOX
Click to explore
Overview Innovation and insight combine in Vox, a market leading end-to-end integrated ICT and infrastructure provider and telecommunications company....
 

Click to explore
Wolfpack Information Risk (Pty) Ltd is a South African owned company established in 2011. We provide specialist information and cyber threat consulting,...
 

Click to explore
Company and Vision ZeroFOX, the global category leader in public attack surface protection, safeguards modern organizations from dynamic security risks...