|
Bitrate
Spaces Building, Willow Wood Office Park, cnr 3rd & Cedar Avenue, Broadacres
Core business offering: Bitrate is an ICT distributor.
|
Section - IoT/IT security infrastructure
-Computers & accessories
-Cyber surveillance equipment
-Network security appliance
-Unified threat management hardware
-Anti-phishing software/services
-Anti-virus/malware s/w
-Data backup/restore
-Data loss prevention
-Employee monitoring s/w
-Encryption s/w
-Firewalls
-Network security s/w
-Other security management platforms
-Secure communication solutions
-Data centre equipment
-Wiring & cabling solutions
-Identity management/user provisioning
-Usage management & monitoring
-Vulnerability assessments & penetration testing
-Wireless security
-Edge security solutions
-Network hardware
-Network management s/w
-Network optimisation
-Network security appliance
-Network security solutions
-Other networking equipment
-Portable wireless networking equipment
-Wireless networking
-Wireless security solutions
News from Bitrate: |
Simplifying SIEM, EDR, XDR and SOAR
Issue 7 2022, Information Security, Editor's Choice, Bitrate
Jeroen Dubbelman unpacks what some of the latest acronyms used in the cybersecurity industry actually mean to businesses looking for solutions for their cyber requirements. |
Security news: |
Almost 50% of companies choose to pay the ransom
Issue 3 2025, Information Security, News & Events
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years. |
Analyse, automate, and optimise logistics processes
Issue 3 2025, Surveillance, Transport (Industry), Products & Solutions, Logistics (Industry), neaMetrics
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity. |
Survey highlights cost of cyberdamage to industrial companies
Issue 3 2025, Information Security, News & Events, Kaspersky
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million. |
Gallagher Security achieves ISO 27001 recertification
Issue 3 2025, News & Events, Training & Education
Gallagher Security has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications and reflects a continued commitment to the highest standards of information security. |
Digital economy needs an agile approach to cybersecurity
Issue 3 2025, Information Security, News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks |
IQ Panels now supported by PowerManage
Issue 3 2025, Products & Solutions, Johnson Controls - (Tyco Security Products)
IQ Panels, now supported by PowerManage, simplify installation and data management. The PowerManage interactive platform allows for localised data storage, so customer information is not stored in the cloud or exposed to a third party. |
Value and industry insight
Issue 3 2025, News & Events, Training & Education, Securex South Africa
Securex South Africa 2025, co-located with A-OSH EXPO, Facilities Management Expo, and Firexpo, drew thousands of security professionals from across the continent and beyond, offering a platform for networking, product discovery, and knowledge sharing. |
SIEM rule threat coverage validation
Issue 3 2025, Information Security, News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections. |
visit www.securitysa.com |
|
|
|
|
|