-
Hi-Tech Security Business Directory (HSBD)
ITgility

Building 1,Waterfall Point Office Park, cnr Woodmead & Maxwell Drive, Midrand

tel:  
+27 11 805 1402
email:  
[email protected]
url:  
www.itgility.co.za

Core business offering: ITgility has experts in business, technology, and industry who leverage modern and advanced technology to help organisations reduce risk, meet compliance, and boost market response. It also aims to assist organisations in creating new revenue streams by mining and deriving intelligence from company data. The framework for a highly secure, trusted, and scalable infrastructure ready for artificial intelligence and hybrid cloud is essential for modern data centres and businesses.


Mokoena, Thandiwe
Sales
[email protected]
Pillay, Envor
Sales
[email protected]
Swanevelder, Jacques
Technical
[email protected]
Amazon Web Services
(Sub Agency)
Cisco
(Sub Agency)
Commvault
(Sub Agency)
Dell Technologies
(Sub Agency)
Fortinet
(Sub Agency)
Hitachi
(Sub Agency)
HPE
(Sub Agency)
IBM
(Sub Agency)
McAfee
(Sub Agency)
Nutanix
(Sub Agency)
Sophos
(Sub Agency)
Splunk
(Sub Agency)
Symantec
(Sub Agency)
Trend Micro
(Sub Agency)
VEEAM
(Sub Agency)
VMware
(Sub Agency)
Section - IoT/IT security infrastructure
-Cables & fibres
-Enclosures, racks & consoles
- Cabinets - free-standing
- Consoles - workstations, desk
- Racks & sub-racks
-Computers & accessories
-Encryption hardware
-Network security appliance
-Secure storage media
- Hard drive
- Magnetic tape & cassette
- Optical media
- Removable media
-Anti-phishing software/services
-Anti-virus/malware s/w
-Business continuity services
-Data backup/restore
-Data loss prevention
-Disaster recovery services
-Encryption s/w
-Firewalls
-IoT/Edge security s/w
-Network security s/w
-Security info & event management platforms (SIEM)
-Data centre equipment
-Racks & enclosures
-Network security
-Vulnerability assessments & penetration testing
-BYOD solutions
-Consoles - workstations, desk
-Edge security solutions
-Network management s/w
-Network optimisation
-Network security solutions
-Other networking equipment
-Routers & switches
-Servers
-Wireless networking
-Wireless security solutions
-LAN/WAN solutions
-Network management solutions
-Routers
-Switches
-Telephony/CTI/VOIP
-Cybersecurity products
-Cybersecurity services
-Installation/integration services
-Integrated solutions
-Networking & communications
-E-mail archiving solutions
-Hard drives
-RAID controllers/adaptors
-SAN/NAS
-Solid-state disks
-Storage management
- Backup/recovery
- Clustering
- Security
- Storage management
Section - Service providers
-Disaster recovery services
-Technical focus
- IT infrastructure
-Backup & recovery
-Business continuity services
-Disaster recovery
-Hosted/cloud services
-Information/cybersecurity
-Monitoring services
-Security as a Service
-Video Surveillance as a Service (VSaaS)
News from ITgility:
Optimising video across the WAN
CCTV Handbook 2012, Surveillance, ITgility

Real-time applications, like video surveillance, video streaming and video conferencing currently account for over 30% of worldwide typical enterprise’s application mix. These applications behave differently than traditional enterprise applications like file, e-mail and Web services - especially when used across a wide area network (WAN).

Security news:
Back-up securely and restore in seconds
Issue 3 2025, Information Security, Infrastructure, Editor's Choice, Betatrac Telematic Solutions

Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Suprema unveils BioStar Air
Issue 3 2025, Access Control & Identity Management, News & Events, Infrastructure, Suprema, neaMetrics

Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Digitising security solutions with AI and smart integration
Issue 3 2025, Integrated Solutions, Regal Security Distributors SA, Technews Publishing

The Regal Projects Team’s decades of experience and commitment to integration have brought the digital security guard to life as a trusted force for safer, smarter living.

Next generation of AI-powered video telematics
Issue 3 2025, Surveillance, Transport (Industry), IoT & Automation

Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

How intrusion protection helps secure O&G operations
SMART Surveillance 2025, Surveillance, Perimeter Security, Alarms & Intruder Detection, Industrial (Industry)

For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

New law enforcement request portal
Issue 3 2025, News & Events, Security Services & Risk Management

inDrive launches law enforcement request portal in South Africa to support safety investigations. New portal allows authorised South African law enforcement officials to securely request user data related to safety incidents.

Agentic AI: Building castles on quicksand?
SMART Surveillance 2025, AI & Data Analytics

Agentic AI covers a diverse range, from simple chatbots to the vision of fully autonomous systems that can act, reason, and take initiative. While the current hype often overshadows practical discussions, there is undeniable potential for rapid advances in this field.

Continuous AML risk monitoring
Issue 3 2025, Access Control & Identity Management, Security Services & Risk Management, Financial (Industry)

AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

visit www.securitysa.com

         
 
 
             
   
     
Copyright © Technews Publishing (Pty) Ltd. All rights reserved.