-
Hi-Tech Security Business Directory (HSBD)
Iron Mountain South Africa

85 Morkel Close, Capital Hill Commercial Estate, Midrand

tel:  
+27 11 312 5000
fax:  
+27 11 312 5005
toll-free:  
0861 274 733
email:  
[email protected]
url:  
www.ironmountain.com

Iso Certification 9001 / 14001 / 15801 / 27001 / 45001

Core business offering: Efficient records management is essential in today’s competitive environment. Iron Mountain manages information throughout its lifecycle and keeps up to date with evolving industry regulations. This enables you to achieve and maintain compliance in both hard-copy and electronic formats, from records creation to final destruction.


Cape Town

tel: +27 21 982 1975
fax: +27 21 982 0966
[email protected]
Durban

tel: +27 31 914 4151
fax: +27 86 673 1880
[email protected]
Bloemfontein

tel: +27 51 523 3780
[email protected]
East London

tel: +27 43 726 8767
[email protected]
Port Elizabeth

tel: +27 41 451 0895
[email protected]
Nelspruit

tel: +27 13 750 2528
[email protected]
George

tel: +27 44 874 5647
[email protected]
Cupido, Adam
Shred Operations Manager Cape Town
[email protected]
Fourie, Flamely
Regional Operations Manager Western Cape
[email protected]
Fourie, Flamely
Regional Operations Manager Western Cape
[email protected]
Gopal, Denzil
Regional Operational Manager KZN
[email protected]
Holmes, Tony
Regional Operations Manager Eastern Cape
[email protected]
Kruger, Etienne
Regional Operations Manager Gauteng
[email protected]
Nunes, Andre
Shredding Supervisor Cape Town
[email protected]
Tshivase, Johannes
Shred Operations Manager Gauteng
[email protected]
Iron Mountain
(Sole Agency)
Section - IoT/IT security infrastructure
-Storage management
- Backup/recovery
- Storage management
Section - Service providers
-Information/cybersecurity
-Risk management
Security news:
Super election year increases risks of political violence
April 2024, Editor's Choice

Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

AI-enabled tools reducing time to value and enhancing application security
April 2024, Editor's Choice

Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

2024 State of Security Report
April 2024, Editor's Choice

Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

How to spot a cyberattack if you are not a security pro
April 2024, Editor's Choice

Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Cyberthreats facing SMBs
April 2024, Editor's Choice

Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Are we our own worst enemy?
April 2024, Editor's Choice

Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Protecting IP and secret data in the age of AI
April 2024, Editor's Choice

The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

What are MFA fatigue attacks, and how can they be prevented?
April 2024, Information Security

Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.