|
Blue Turtle Technologies
Midridge Office Park - Block H, International Business Gateway, cnr New Road & 6th Street, Halfway House, Midrand
Core business offering: Blue Turtle combines your business needs with technology practices, carefully mapping solutions suited to your organisation. Today, it offers solutions to help you navigate the cloud and embrace digital transformation, focusing on security, business and process optimisation, data management and governance, artificial intelligence (AI) and machine learning.
|
Section - IoT/IT security infrastructure
-Anti-phishing software/services
-Anti-virus/malware s/w
-Asset/user tracking s/w
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Employee monitoring s/w
-Encryption s/w
-Firewalls
-Governance & compliance s/w
-IoT/Edge security s/w
-IT audit s/w
-Network security s/w
-Other security management platforms
-Password management s/w
-Remote/hosted security s/w & services
-Risk management s/w
-Secure communication solutions
-Security info & event management platforms (SIEM)
-Authentication & identity verification systems
-Certificate authority/certification services
-Data privacy tools
-Identity management/user provisioning
-Mobile security
-Network security
-Remote access security
-Usage management & monitoring
-Vulnerability assessments & penetration testing
-Communication security solutions
-Network management s/w
-Network security solutions
Section - Service providers
-Risk assessments/audits
-Security assessment & policy
-AI-enhanced services
-Backup & recovery
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
-Security as a Service
Security news: |
Almost 50% of companies choose to pay the ransom
Issue 3 2025, Information Security, News & Events
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years. |
Analyse, automate, and optimise logistics processes
Issue 3 2025, Surveillance, Transport (Industry), Products & Solutions, Logistics (Industry), neaMetrics
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity. |
Survey highlights cost of cyberdamage to industrial companies
Issue 3 2025, Information Security, News & Events, Kaspersky
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million. |
Gallagher Security achieves ISO 27001 recertification
Issue 3 2025, News & Events, Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security. |
Digital economy needs an agile approach to cybersecurity
Issue 3 2025, Information Security, News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks |
IQ Panels now supported by PowerManage
Issue 3 2025, Products & Solutions, Johnson Controls - (Tyco Security Products)
IQ Panels, now supported by PowerManage, simplify installation and data management. The PowerManage interactive platform allows for localised data storage, so customer information is not stored in the cloud or exposed to a third party. |
Value and industry insight
Issue 3 2025, News & Events, Training & Education, Securex South Africa
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing. |
SIEM rule threat coverage validation
Issue 3 2025, Information Security, News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections. |
visit www.securitysa.com |
|
|
|
|
|