-
Hi-Tech Security Business Directory (HSBD)
ITgility

Building 1,Waterfall Point Office Park, cnr Woodmead & Maxwell Drive, Midrand

tel:  
+27 11 805 1402
email:  
[email protected]
url:  
www.itgility.co.za

Core business offering: ITgility has experts in business, technology, and industry who leverage modern and advanced technology to help organisations reduce risk, meet compliance, and boost market response. It also aims to assist organisations in creating new revenue streams by mining and deriving intelligence from company data. The framework for a highly secure, trusted, and scalable infrastructure, ready for artificial intelligence and hybrid cloud, is essential for modern data centres and businesses.


Mokoena, Thandiwe
Sales
[email protected]
Pillay, Envor
Sales
[email protected]
Swanevelder, Jacques
Technical
[email protected]
Amazon Web Services
(Sub Agency)
Cisco
(Sub Agency)
Commvault
(Sub Agency)
Dell Technologies
(Sub Agency)
Fortinet
(Sub Agency)
Hitachi
(Sub Agency)
HPE
(Sub Agency)
IBM
(Sub Agency)
McAfee
(Sub Agency)
Nutanix
(Sub Agency)
Sophos
(Sub Agency)
Splunk
(Sub Agency)
Symantec
(Sub Agency)
Trend Micro
(Sub Agency)
VEEAM
(Sub Agency)
VMware
(Sub Agency)
Section - IoT/IT security infrastructure
-Cables & fibres
-Enclosures, racks & consoles
- Cabinets - free-standing
- Consoles - workstations, desk
- Racks & sub-racks
-Computers & accessories
-Encryption hardware
-Network security appliance
-Secure storage media
- Hard drive
- Magnetic tape & cassette
- Optical media
- Removable media
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Encryption s/w
-Firewalls
-IoT/Edge security s/w
-Network security s/w
-Security info & event management platforms (SIEM)
-Data centre equipment
-Racks & enclosures
-Network security
-Vulnerability assessments & penetration testing
-BYOD solutions
-Consoles - workstations, desk
-Edge security solutions
-Network management s/w
-Network optimisation
-Network security solutions
-Other networking equipment
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
-LAN/WAN solutions
-Network management solutions
-Routers
-Switches
-Telephony/CTI/VOIP
-Cybersecurity products
-Cybersecurity services
-Installation/integration services
-Integrated solutions
-Networking & communications
-E-mail archiving solutions
-Hard drives
-RAID controllers/adaptors
-SAN/NAS
-Solid-state disks
-Storage management
- Backup/recovery
- Clustering
- Security
- Storage management
Section - Service providers
-Disaster recovery services
-Technical focus
- IT infrastructure
-Backup & recovery
-Business continuity services
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
-Security as a Service
-Video Surveillance as a Service (VSaaS)
News from ITgility:
Optimising video across the WAN
CCTV Handbook 2012, Surveillance, ITgility

Real-time applications, like video surveillance, video streaming and video conferencing currently account for over 30% of worldwide typical enterprise’s application mix. These applications behave differently than traditional enterprise applications like file, e-mail and Web services - especially when used across a wide area network (WAN).

Security news:
Here’s to a SMART 2026
Issue 6 2025, News & Events, SMART Security Solutions

This is the final news brief from SMART Security Solutions for 2025, and the teams would like to take this opportunity to thank our readers, advertisers and partners and wish everyone a safe and secure festive season.

Toxic combinations
Issue 6 2025, Editor's Choice

According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Onsite AI avoids cloud challenges
Issue 6 2025, Infrastructure, Editor's Choice, AI & Data Analytics, SMART Security Solutions, Technews Publishing

Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Cybersecurity operations done right
Issue 6 2025, Information Security, LanDynamix, SMART Security Solutions, Technews Publishing

For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

A year of integration, intelligence, and innovation
Issue 6 2025, Products & Solutions, Suprema, neaMetrics

From the cloud-native CLUe platform and CoreStation 20 controller to the global debut of BioStar X, Suprema has redefined what connected, AI-driven security means for enterprises.

Smarter access, stronger defence
Issue 6 2025, Access Control & Identity Management, Security Services & Risk Management, Retail (Industry), Secutel Technologies

The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

AI and automation are rewriting the cloud security playbook
Issue 6 2025, AI & Data Analytics, Technews Publishing

Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

neaMetrics 2025: Year in review
Issue 6 2025, AI & Data Analytics

With a stronger team, a broader portfolio, and a clear vision for what’s next, neaMetrics is well positioned to continue delivering smarter, more connected security solutions in 2026 and beyond.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.