Company type
Location
All Categories (A - Z)

Directory

A10
Click to explore
A10 provides high-performance detection and prevention against DDoS and protocol attacks. Since the A10 Thunder and AX Series ADCs are placed between the...
 

Click to explore
Come and advertise your company here! Click the link below to be taken to our registration page where you can sign up for our free Leopard package....
 

Click to explore
PERSISTENCE TECHNOLOGY Patented Persistence® technology from Absolute provides customers with visibility and control over all of their devices,...
 

Click to explore
Exclusive distributors of Zscaler in Sub-saharan Africa
 

Click to explore
Enterprise Content Firewall Protect Sensitive Information from 3rd Party Cyber Risk CONSOLIDATE COMMUNICATIONS Consolidate and Control 3rd Party...
 

Click to explore
BUSINESS DRIVEN SECURITY MANAGEMENT Discover, map and migrate business application connectivity to the cloud Proactively analyze security risk from the...
 

Click to explore
Anomali helps organizations find and respond to cyber threats. With Anomali you can now identify suspicious or malicious traffic before it even reaches your...
 

Click to explore
Malware detection. Multi-Layer Ransomware Protection. Zero System Slowdowns. Webcam Protection. Automatic Upgrades. From IoT to Data Centres, from endpoints...
 

Click to explore
CONDYN has been serving the Africa continent with Information Security Solutions that now includes Fraud, Risk and compliance solutions. Our solutions is...
 

Click to explore
Cyber Security South-Africa (CSSA)  is an industry-leading, Cyber Security Technology Distributor, backed by globally recognised international...
 

Click to explore
Attackers spend an average of 99 days inside your systems undetected. Their target? Unsecured privileged accounts and credentials giving them access to your...
 

Click to explore
We are rewriting the rules on how organisations protect themselves against rapidly evolving adversaries. Today’s threat environment requires understanding...
 

Click to explore
Deloitte Cyber helps organisations create a cyber-minded culture and become stronger, faster, more innovative and more resilient in the face of persistent...
 

Click to explore
What's DeskAlerts Alerting Software? DeskAlerts Alerting Software is a special system that allows for the transmission of information to a large number...
 

Click to explore
We are all about performance, and how to get every last drop out of your existing hardware. Increasing the longevity of your current IT Equipment primarily...
 

Click to explore
The International Council of Electronic Commerce Consultants (EC-Council) is a professional organization that certifies individuals in various e-business...
 

Click to explore
Elliptic Consulting is an internet security consultancy and services provider that specialises in: Security Policy Development Software Auditing and Code...
 

Click to explore
ellipticSecure provides general purpose PKCS#11 compliant HSMs and FIDO2 Hardware Security Keys to small and medium enterprises in order to protect...
 

Click to explore
Project Management Office (PMO) • PMO Management (Outsourced) • IT Strategy alignment to Corporate strategy • SAP Green, Brown and Blue fields...
 

Click to explore
Executive Solutions, is a managed services provider (MSP), delivering technology support, infrastructure and security services to businesses of all sizes....
 

Click to explore
Group-IB has been pioneering incident response and cybercrime investigation practices since 2003. This experience and understanding of threat actors’...
 

Click to explore
We represent the Siemens Ruggedcom Portfolio. Specialising in Industrial Communications and Cyber Security for power grids and organisations running...
 

Click to explore
We specialize in cyber-security solutions across different industry verticals. Our core value proposition is our ability to deliver robust, transformative...
 

Click to explore
ABOUT IKUSASA TECHNOLOGY SOLUTIONS IKUSASA Technology Solutions (Ikusasa) is a company providing Information and Communication Technology (ICT) training...
 

ISM
Click to explore
ISM was established in 2005 as a fully integrated IT solutions and services provider. We deliver cutting edge solutions based on the latest technologies to...
 

Click to explore
About LAWtrust LAWtrust is Africa’s leading trust centre, security integrator and security solutions developer. In short, what that means is we provide...
 

Click to explore
Legal Compliance Consulting, Information Security Consulting, Cyber Security Consulting, Labour Consulting Services and Training Seminars
 

Click to explore
Nclose is an international cybersecurity defence, offence and protection specialist based in South Africa. Through a combination of a class-leading global...
 

Click to explore
Networks Unlimited is a value-added distributor, committed to empowering African businesses through innovative technology solutions. Our focus includes the...
 

Click to explore
About Obashi Obashi is the world-leading data flow expert and its co-founders have written the fundamental laws and principles around the control,...
 

Click to explore
About OneTrust OneTrust technology powers privacy, security and data governance programs. More than 6,000 customers use OneTrust to build integrated...
 

Click to explore
Paresco Solutions is founded on the premise of the Pareto principal (20%-80%) and provide services and solutions that aligns risk and maturity with...