-
Hi-Tech Security Business Directory (HSBD)
ITgility

Building 1,Waterfall Point Office Park, cnr Woodmead & Maxwell Drive, Midrand

tel:  
+27 11 805 1402
email:  
info@itgility.co.za
url:  
www.itgility.co.za

Core business offering: ITgility has experts in business, technology, and industry who leverage modern and advanced technology to help organisations reduce risk, meet compliance, and boost market response. It also aims to assist organisations in creating new revenue streams by mining and deriving intelligence from company data. The framework for a highly secure, trusted, and scalable infrastructure, ready for artificial intelligence and hybrid cloud, is essential for modern data centres and businesses.


Mokoena, Thandiwe
Sales
thandiwem@itgility.co.za
Pillay, Envor
Sales
envorp@itgility.co.za
Swanevelder, Jacques
Technical
jacquess@itgility.co.za
Amazon Web Services
(Sub Agency)
Cisco
(Sub Agency)
Commvault
(Sub Agency)
Dell Technologies
(Sub Agency)
Fortinet
(Sub Agency)
Hitachi
(Sub Agency)
HPE
(Sub Agency)
IBM
(Sub Agency)
McAfee
(Sub Agency)
Nutanix
(Sub Agency)
Sophos
(Sub Agency)
Splunk
(Sub Agency)
Symantec
(Sub Agency)
Trend Micro
(Sub Agency)
VEEAM
(Sub Agency)
VMware
(Sub Agency)
Section - IoT/IT security infrastructure
-Cables & fibres
-Enclosures, racks & consoles
- Cabinets - free-standing
- Consoles - workstations, desk
- Racks & sub-racks
-Computers & accessories
-Encryption hardware
-Network security appliance
-Secure storage media
- Hard drive
- Magnetic tape & cassette
- Optical media
- Removable media
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Encryption s/w
-Firewalls
-IoT/Edge security s/w
-Network security s/w
-Security info & event management platforms (SIEM)
-Data centre equipment
-Racks & enclosures
-Network security
-Vulnerability assessments & penetration testing
-BYOD solutions
-Consoles - workstations, desk
-Edge security solutions
-Network management s/w
-Network optimisation
-Network security solutions
-Other networking equipment
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
-LAN/WAN solutions
-Network management solutions
-Routers
-Switches
-Telephony/CTI/VOIP
-Cybersecurity products
-Cybersecurity services
-Installation/integration services
-Integrated solutions
-Networking & communications
-E-mail archiving solutions
-Hard drives
-RAID controllers/adaptors
-SAN/NAS
-Solid-state disks
-Storage management
- Backup/recovery
- Clustering
- Security
- Storage management
Section - Service providers
-Disaster recovery services
-Technical focus
- IT infrastructure
-Backup & recovery
-Business continuity services
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
-Security as a Service
-Video Surveillance as a Service (VSaaS)
News from ITgility:
Optimising video across the WAN
CCTV Handbook 2012, Surveillance, ITgility

Real-time applications, like video surveillance, video streaming and video conferencing currently account for over 30% of worldwide typical enterprise’s application mix. These applications behave differently than traditional enterprise applications like file, e-mail and Web services - especially when used across a wide area network (WAN).

Security news:
PoPIA turns its attention to gated access
May 2026, News & Events, Security Services & Risk Management

The Information Regulator has gazetted its proposed Code of Conduct for the processing of personal information at gated access points. At 65 pages long, the code signals a significant shift in how personal information is collected and managed at entry points.

Employees are SA’s biggest cyber threat
May 2026, Information Security, Security Services & Risk Management

South Africa experienced a 46% increase in insider cyber risk in 2026, surpassing the global average of 44%. What is more, 63% of South African companies surveyed expect insider-driven data losses to increase.

The post-Q1 security checklist
May 2026, Asset Management, Security Services & Risk Management

By this time of year, employees have changed jobs or roles, suppliers may have changed, and devices have moved between offices, homes, and sites. This is the right time for businesses to run a practical post-Q1 security check.

Aerial firefighter training revolution
May 2026, Fire & Safety, News & Events

Sophisticated new flight simulation software capable of accurately modelling the performance of firefighting helicopters could help train pilots to tackle wildfires more effectively and safely in the future.

Key attributes of an effective cybersecurity leader
May 2026, Information Security, BlueVision

In an evolving technology landscape, an effective cyber leader must combine technical acumen, foresight, and adaptive leadership to mitigate risks, and risks can only be mitigated once accurately identified and remedial processes are in place.

Tackling enterprise security ‘tool sprawl’
May 2026, Information Security, NEC XON

South African ICT solutions provider NEC XON is advocating a shift away from fragmented cybersecurity toolsets towards unified platforms, arguing that ‘tool sprawl’ is undermining the effectiveness of enterprise security operations.

Surge in AI-enabled cybercrime and a 389% increase in ransomware
May 2026, Information Security, News & Events

Cybercrime no longer functions as a series of isolated campaigns; it operates as a system, with malicious hackers operating across an end-to-end life cycle and compressing the attack life cycle with shadow agents.

Power, performance and profit
May 2026, Infrastructure, Power Management

Electricity remains the single largest operating cost for most data centres. In many African markets, power infrastructure is ageing or inconsistent, forcing operators to rely on backup generation to keep facilities online.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.