-
Hi-Tech Security Business Directory (HSBD)
ITgility

Building 1,Waterfall Point Office Park, cnr Woodmead & Maxwell Drive, Midrand

tel:  
+27 11 805 1402
email:  
[email protected]
url:  
www.itgility.co.za

Core business offering: ITgility has experts in business, technology, and industry who leverage modern and advanced technology to help organisations reduce risk, meet compliance, and boost market response. It also aims to assist organisations in creating new revenue streams by mining and deriving intelligence from company data. The framework for a highly secure, trusted, and scalable infrastructure, ready for artificial intelligence and hybrid cloud, is essential for modern data centres and businesses.


Mokoena, Thandiwe
Sales
[email protected]
Pillay, Envor
Sales
[email protected]
Swanevelder, Jacques
Technical
[email protected]
Amazon Web Services
(Sub Agency)
Cisco
(Sub Agency)
Commvault
(Sub Agency)
Dell Technologies
(Sub Agency)
Fortinet
(Sub Agency)
Hitachi
(Sub Agency)
HPE
(Sub Agency)
IBM
(Sub Agency)
McAfee
(Sub Agency)
Nutanix
(Sub Agency)
Sophos
(Sub Agency)
Splunk
(Sub Agency)
Symantec
(Sub Agency)
Trend Micro
(Sub Agency)
VEEAM
(Sub Agency)
VMware
(Sub Agency)
Section - IoT/IT security infrastructure
-Cables & fibres
-Enclosures, racks & consoles
- Cabinets - free-standing
- Consoles - workstations, desk
- Racks & sub-racks
-Computers & accessories
-Encryption hardware
-Network security appliance
-Secure storage media
- Hard drive
- Magnetic tape & cassette
- Optical media
- Removable media
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Encryption s/w
-Firewalls
-IoT/Edge security s/w
-Network security s/w
-Security info & event management platforms (SIEM)
-Data centre equipment
-Racks & enclosures
-Network security
-Vulnerability assessments & penetration testing
-BYOD solutions
-Consoles - workstations, desk
-Edge security solutions
-Network management s/w
-Network optimisation
-Network security solutions
-Other networking equipment
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
-LAN/WAN solutions
-Network management solutions
-Routers
-Switches
-Telephony/CTI/VOIP
-Cybersecurity products
-Cybersecurity services
-Installation/integration services
-Integrated solutions
-Networking & communications
-E-mail archiving solutions
-Hard drives
-RAID controllers/adaptors
-SAN/NAS
-Solid-state disks
-Storage management
- Backup/recovery
- Clustering
- Security
- Storage management
Section - Service providers
-Disaster recovery services
-Technical focus
- IT infrastructure
-Backup & recovery
-Business continuity services
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
-Security as a Service
-Video Surveillance as a Service (VSaaS)
News from ITgility:
Optimising video across the WAN
CCTV Handbook 2012, Surveillance, ITgility

Real-time applications, like video surveillance, video streaming and video conferencing currently account for over 30% of worldwide typical enterprise’s application mix. These applications behave differently than traditional enterprise applications like file, e-mail and Web services - especially when used across a wide area network (WAN).

Security news:
What is your ‘real’ security posture?
Issue 6 2025, Information Security, Infrastructure, Editor's Choice, AI & Data Analytics, BlueVision

Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

GenAI fraud forcing banks to shift from identity to intent
Issue 6 2025, Information Security, Financial (Industry), AI & Data Analytics

The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Cyber attack surface expanding
Issue 6 2025, Information Security, Asset Management, Logistics (Industry)

Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Fire safety cannot be ignored
Issue 6 2025, Fire & Safety

Fire safety is a combination of technology, product certifications, and experience that ensures that every project is planned correctly at inception according to client requirements, while meeting SANS standards.

New Edge AI Plus PTZ cameras with analytics
Issue 6 2025, Surveillance, Products & Solutions

IDIS has unveiled two new PTZ cameras that are NDAA-compliant, delivering AI auto-tracking, rapid 40x zoom, EIS image stabilisation, and advanced automated AI functionality.

Recording 40 high-resolution channels
Issue 6 2025, Surveillance, Products & Solutions, Dallmeier Electronic Southern Africa

With the new MK4 revision of the DMS 2400, Dallmeier introduces a more powerful version of its video appliance, enabling the recording of up to 40 high-resolution video streams, and offering significantly increased capacity.

Understanding shared responsibility
Issue 6 2025, Infrastructure

Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Kaspersky finds security flaws that threaten vehicle safety.
Issue 6 2025, Information Security, News & Events, Transport (Industry)

At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.