InfoGuardian is a specialist Information Security Services Provider focused on ensuring that our customers derive maximum value from their investments in IT Security Infrastructure. Our core competency is in ensuring that the security technologies deployed within our customers' environments, whether chosen by our customers or ourselves, are functional, effective and consistently deliver on the level of protection they were originally designed and purchased for.
Vodacom Business was established in 2008 as the enterprise arm of Vodacom Group. It delivers total communication solutions to meet the needs of the public sector, large, medium and small enterprises.
Vodacom Business offers solutions that extend from mobile to fixed line access, Virtual Private Networks (VPNs), Voice over IP (VoIP), hosted facilities, cloud computing based hosted services, storage, back up, security and application solutions.
ITWeb 2017 Security Summit and inaugural #SS17HACK took place from 15 – 19 May 2017 and by all accounts it was an astounding success.
Speakers, sponsors and attendees have had nothing but great feedback on the networking opportunities provided; content delivered; professionalism of the staff and the opportunity to meet up and coming infosec professionals at the hackathon.
"It was my first time being involved at ITWeb Sec Summit at various levels other than just being a speaker or attendee and I must say I am very impressed of the standard and your organisation. Your team is brilliant!"
"I surely foresee more great things when you have such an open minded team who are always willing to push the boundaries."
"Thank you for an amazing conference, still my favourite of the year. Looking forward to working with you on future events."
"Unfortunately I didn't make it there this year, but heard good feedback from our team."
"Thank-you for giving me the opportunity – it was a great Summit."
I look forward to 2018 and hope that you will consider submitting your ideas, advice, challenges, papers for submission to me at Allyson Towle, over the course of the next few months, so that I can even more closely meet your requirements.
Until next year.
With software development, you don't have to stay up all night and eat junk food. But it seems to help.
Read the full storyMustafa Al-Bassam shared his story as a black hat hacker who was sentenced to 20 months in prison.
Read the full storyToday, ransomware is one of the biggest cyber threats in 2016. To avoid becoming a victim, you need to take action now to protect your computer systems.
Read the full storyInnocent people could go to prison and have their lives destroyed as a result, says forensic scientist Jason Jordaan.
Read the full storyThe CSIR's Joey Jansen van Vuuren says capability and capacity-building for cyber security in SA won't be possible without skills development.
Read the full storyNo one solution will ever be a complete solution, says Varun Parikh of Sophos.
Read the full storyThe government organisation has been working to create systems that they have built themselves instead of relying on systems built by others.
Read the full storyIt's not just malicious code that infosec experts have to watch out for. You also need to watch out for your boss.
Read the full storyData privacy is about assuring consumers that the trust they placed in a brand is warranted, says Oracle.
Read the full storyThe majority of cyber crime cases go unpunished because investigators fail to follow the proper procedures, says AfICTA.
Read the full storyDeep inside Vodaworld, a group of young hackers get to grips with the next generation of security products.
Read the full storyReactive defence is not good enough, says Saumil Shah, CEO of Net-Square Solutions.
Read the full storyThe ransomware that spread worldwide last Friday stirred mixed reactions in local experts at ITWeb Security Summit 2017.
Read the full storySimulating attacks, cyber threat hunting and attack path mapping are options to look at, says Jacques Louw, MWR InfoSecurity.
Read the full storyStop living in a world where you think no one is trying to attack you, says Jason Street of Pwnie Express.
Read the full story
InfoGuardian is a specialist Information Security Services Provider focused on ensuring that our customers derive maximum value from their investments in IT Security Infrastructure. Our core competency is in ensuring that the security technologies deployed within our customers’ environments, whether chosen by our customers or ourselves, are functional, effective and consistently deliver on the level of protection they were originally designed and purchased for.
For more information visit: www.infoguardian.com.
Vodacom Business was established in 2008 as the enterprise arm of Vodacom Group. It delivers total communication solutions to meet the needs of the public sector, large, medium and small enterprises.
Vodacom Business offers solutions that extend from mobile to fixed line access, Virtual Private Networks (VPNs), Voice over IP (VoIP), hosted facilities, cloud computing based hosted services, storage, back up, security and application solutions.
For more information visit: vodacombusiness.co.za.
DRS
DRS is an ICT services and solutions provider specialising in providing innovation and agility in security, risk management and governance. Partnering with leading technology providers, DRS offers a complete portfolio of professional security services.
www.drs.co.za
McAfee
McAfee is one of the world's leading independent cybersecurity companies. Inspired by the power of working together, McAfee creates business and consumer solutions that make the world a safer place. For businesses, McAfee helps orchestrate holistic cybersecurity environments that work smarter, not harder. For consumers, McAfee helps by securing their digital lifestyle at home and away.
www.mcafee.com
DRS is an ICT services and solutions provider specialising in providing innovation and agility in security, risk management and governance. Partnering with leading technology providers, DRS offers a complete portfolio of professional security services.
RSA
More than 30,000 customers worldwide—including nearly half the global Fortune 500—rely on RSA Business-Driven Security solutions for cyber threat detection and response, identity and access management, online fraud prevention, and business risk management solutions. Armed with the industry's most powerful tools, enterprises can better focus on growth, innovation and transformation in today's volatile business environment.
www.rsa.com
Check Point
Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. Check Point is committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future.
www.checkpoint.com
Samsung Electronics Co., Ltd. inspires the world and shapes the future with transformative ideas and technologies. The company is redefining the worlds of TVs, smartphones, wearable devices, tablets, cameras, digital appliances, printers, medical equipment, network systems and semiconductor and LED solutions. For the latest news, please visit the Samsung Newsroom at news.samsung.com.
Visit: www.samsung.com/za/business/.
NEC together with XON, a leading sub-Saharan Africa ICT Systems integrator to accelerate regional growth for both organisations by introducing complimentary technology and solutions into a combined, sub-Saharan customer base whilst increasing regional coverage, skills and expertise. The joint operation will be focusing on technology solution for telecoms, Government, Enterprise and Energy sectors.
za.nec.com
www.xon.co.za
Symantec Corporation (NASDAQ: SYMC), the world's leading cyber security company, is defining the future of cybersecurity by solving the industry's toughest challenges of securing mobile workforces, protecting the cloud, and stopping advanced threats. Organizations around the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Symantec operates the world's largest civilian cyber intelligence network, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn.
Visit: https://www.symantec.com/.
CyberArk is the only security company that proactively stops the most advanced cyber threats - those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage.
For more information, please visit www.cyberark.com
LAWtrust
LAWtrust is Africa's leading trust centre, information security integrator and solutions developer. We build trust in information systems through establishing authenticity, confidentiality, and integrity of data. Our areas of our expertise include Public Key Infrastructure, SSL certificates, key management, digital signing, authentication, biometrics, electronic ID documents, secure email and database encryption. In the past decade LAWtrust has become a foundational element of South African society, through the security solutions and services we provide to over 1 000 clients in the government and the industry. LAWtrust was the first African trust centre to achieve WebTrust certification and is included in both the Adobe and Microsoft Trust Lists as a Trusted Root Certificate Authority. As the first accredited authentication service provider under the ECT Act LAWtrust provides Advanced Electronic Signatures.
www.lawtrust.co.za
Thales e-Security
Thales e-Security is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored. We ensure that company and government data is secure and trusted in any environment – on premise, in the cloud, in data centers and in big data environments – without sacrificing business agility. Security doesn't just reduce risk, it's an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices. Thales provides everything an organization needs to protect and manage its data, identities and intellectual property and meet regulatory compliance – through encryption, advanced key management, tokenization, privileged user control and meeting the highest standards of certification for high assurance solutions. Security professionals around the globe rely on Thales to confidently accelerate their organization's digital transformation. Thales e-Security is part of Thales Group.
thales-esecurity.com
Netxactics
Netxactics
Established in 1998 Netxactics is a South-African company that specialises in sales, marketing and distribution of IT and related products. Our Approach is quite unique. Focusing on long-term growth, coupled with exceptional customer stability.
www.netxactics.co.za
Rapid7
With Rapid7, technology professionals gain the clarity, command, and confidence to safely drive innovation and protect against risk. We make it simple to collect operational data across systems, eliminating blind spots and unlocking the information required to securely develop, operate, and manage today’s sophisticated applications and services. Our analytics and science transform your data into key insights so you can quickly predict, deter, detect, and remediate attacks and obstacles to productivity. Armed with Rapid7, technology professionals finally gain the insights needed to safely move their business forward.
www.rapid7.com.
Sophos makes IT security simple. Focused on innovation in next-generation protection, Sophos solutions are simple to deploy, maintain and manage, enabling organizations to protect and defend their networks, their information and their people. Sophos – Security made Simple.
Please visit www.sophos.com
Established in 1999, Credence Security the region’s speciality distribution company, specializes in IT security, forensics and incident response. Working closely with leading IT security vendors including AccessData, Fidelis CyberSecurity, eSentire and Digital Guardian, Credence Security delivers Cyber and IT security technologies and solutions that protect organisations against advanced persistent threats, malicious adversaries and internal malpractice.
Please visit www.credencesecurity.com
Darktrace is the world’s leading machine learning company for cyber security. Created by mathematicians from the University of Cambridge, the Enterprise Immune System uses AI algorithms to automatically detect and take action against cyber-threats within all types of networks, including physical, cloud and virtualized networks, as well as IOT and industrial control systems. A self-configuring platform, Darktrace requires no prior set-up, identifying advanced threats including zero-days, insiders and stealthy, silent attackers in real time. Headquartered in San Francisco and Cambridge, UK, Darktrace has 23 offices worldwide.
Please visit www.darktrace.com
Mimecast (NASDAQ: MIME) makes business email and data safer for more than 21,800 customers and their millions of employees worldwide. Founded in 2003, the company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management in a single, fully-integrated subscription service.
Mimecast reduces email risk and the complexity and cost of managing the array of point solutions traditionally used to protect email and its data.
For customers that have migrated to cloud services like Microsoft Office 365TM, Mimecast mitigates single vendor exposure by strengthening security coverage, combating downtime and improving archiving.
Mimecast Email Security protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages.
Mimecast Enterprise Information Archiving unifies email, file and instant messaging data to support e-discovery and give employees fast access to their personal archive via PC, Mac and mobile apps.
Please visit www.mimecast.com
As the fastest-growing, independent identity and access management (IAM) provider, SailPoint helps hundreds of global organizations securely and effectively deliver and manage user access from any device to data and applications residing in the datacenter, on mobile devices, and in the cloud. The company's innovative product portfolio offers customers an integrated set of core services including identity governance, provisioning, and access management delivered on-premises or from the cloud (IAM-as-a-service).
Please visit www.sailpoint.com
CyberTAN is a data security specialist with 40 years of collective experience, bringing value and innovation to our clients. Some of our Vendors include Armor Defense, Carbon Black, Codebashing and Trusted Knight.
Please visit www.cybertan.co.za
Nclose is a leading Specialist Cyber Security Solutions Provider. We architect, deploy and manage security solutions aimed at protecting our clients' resources from damage caused by the ever growing number of threats present in the business place.
Please visit www.nclose.com
VMware, a global leader in cloud infrastructure and business mobility, helps customers accelerate their digital transformation. VMware enables enterprises to master a software-defined approach to business and IT with VMware Cross-Cloud Architecture™ and solutions for the data centre, mobility, and security. It's NSX network virtualization platform embeds security functions right into the hypervisor and delivers micro-segmentation and granular security to the individual workload, enabling a fundamentally more secure data centre. Security policies travel with the workloads, independent of where workloads are in the network topology. With 2016 revenue of $7.09 billion, VMware is headquartered in Palo Alto, CA and has over 500,000 customers and 75,000 partners worldwide.
Please visit www.vmware.com
ASG Africa focuses on solving client challenges around Advanced Endpoint Security including Cyber, Malware and Ransomware attacks, and the Correlation, Auditability and Security aspects of cross-platform Event Log Management including out-of-the-box Compliance capability for standards such as PCI DSS, King III, SOX, etc. ASG Africa also offers additional Financial Sector focused solutions on Governance requirements such as for BCBS 239 and Solvency II, amongst others.
Visit www.asg.africa.com
ATIO
ATIO is a specialist ICT service and solution provider with nearly three decades of experience in servicing telecommunications operators and enterprises across Africa. ATIO provides unique technologies and professional services to improve our clients’ network and application performance, quality and security. Our focus on service excellence and deploying our market-leading skills enables our customers to derive maximum value out of the solutions we deliver. ATIO is a proud Gold Partner of Tripwire in the EMEA region.
www.atio.com
Tripwire
Tripwire is a leading provider of security, compliance and IT operations solutions for enterprises, industrial organizations, service providers and government agencies. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business context; together these solutions integrate and automate security and IT operations. Tripwire’s portfolio of enterprise-class solutions includes configuration and policy management, file integrity monitoring, vulnerability management, log management, and reporting and analytics.
http://www.tripwire.com/
For the past 13 years Cyanre has specialised and become a market leader in the following fields:
The value that Deloitte Risk Advisory Africa creates for organisations is synonymous with operational excellence. We maximise the performance of internal business operations
by identifying, predicting, resolving and mitigating imminent threats and obstacles as well as enhancing the value of these operations.
Please visit www.deloitte.co.za
GEMALTO
About Gemalto's SafeNet Identity and Data Protection Solutions
Gemalto's portfolio of Identity and Data Protection solutions offers one of the most complete portfolios of enterprise security solutions in the world, enabling its customers to enjoy industry-leading protection of data, digital identities, payments and transactions– from the edge to the core. Gemalto's SafeNet Identity and Data Protection solutions enable enterprises across many verticals, including major financial institutions and governments, to take a data-centric approach to security by utilizing innovative encryption methods, best-in-class crypto management techniques, and strong authentication and identity management solutions to protect what matters, where it matters. Through these solutions, Gemalto helps organizations achieve compliance with stringent data privacy regulations and ensure that sensitive corporate assets, customer information, and digital transactions are safe from exposure and manipulation in order to protect customer trust in an increasingly digital world.
www.gemalto.com
StarLink
StarLink is acclaimed as the largest and fastest growing "True" Value-added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 11 countries.
With its innovate Security Framework, StarLink is also recognized as a "Trusted Security Advisor" to over 2200 enterprise and government customers that use one or more of StarLink's best-of-breed and market-leading technologies, sold through its Channel network of over 770 Partners. The StarLink Solution Lifecycle helps Channel Partners differentiate offerings, and assists customers to identify key risks and define priorities for addressing IT Security gaps relating to compliance and next-generation threat protection.
www.starlinkme.net.
With more than 100,000 constituents in 180 countries, ISACA is the leading independent association for governance, risk, compliance, information security and assurance. ISACA attests IT skills and knowledge through the globally respected CISA®, CISM®, CGEIT®, CRISC™ and CSX™ designations.
For more information visit the South Africa Chapter: www.isaca.org/south-africa
J2 Software is a prominent African Information Security company founded in 2006 to address the need for effective information security, governance, risk and compliance solutions and related services across our continent.
Please visit www.j2.co.za
Khipu Networks is a leading provider of Wi-Fi and network security solutions; Ensuring the security, integrity, performance and availability of customer services and networks.
Visit www.khipu-networks.com
Our consultative philosophy of doing business means we are more than just your reseller; we are your business partner. We work closely with each customer to make sure every IT budget is spent wisely and that the result exceeds expectations. By focusing on all aspects of information protection, availability and compliance, M2TD Consulting will ensure that your data is Stored, Moved, Secured, Analysed and Integrated to your business requirements. We have a range of 5 solutions on offer and they are coined as "The 5 Pillars" or SMSA-I. The "5 Pillars or SMSA-I are made up of: STORE IT, MOVE IT, SECURE IT,ANALYSE IT and INTEGRATE IT.
Please visit www.m2td.co.za
Magix Security
Magix Security delivers comprehensive and trusted Cybercrime Defense and Detection solutions and services to address, manage, and contain the risks of financial losses and reputational damage arising from the misuse of applications, or other IT information assets, by employees and/or third parties.
www.magix.co.za
Checkmarx
Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled code in all major coding languages and identify its security vulnerabilities. With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.
Checkmarx has been named a "Challenger" in Gartner's 2014 AST Magic Quadrant and announced "Best Product in Application Security 2014" by Cyber Defense Magazine.
checkmarx.com.
Mobius Consulting designs and produces targeted and sustainable solutions that allow clients to govern and manage their information risk.
Please visit www.mobiusconsulting.co.za
With more than 400,000 customers—including 100 of the Fortune 100—and with deployments across a wide variety of industries in more than 145 countries, Oracle offers a comprehensive and fully integrated stack of cloud applications, platform services, and engineered systems.
For more information about Oracle (NYSE:ORCL), visit www.oracle.com
Parsec designs and manufactures advanced technology systems and products for mining, defence and information security markets. Visit us to learn more about our military strength VPN and cryptographic token products.
Please visit www.parsec.co.za
PhishMe is the leading provider of phishing threat management for organizations concerned about human susceptibility and response to advanced targeted attacks. PhishMe’s intelligence-driven solutions empower employees to be an active line of defense and source of attack intelligence by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Our phishing incident response platform and phishing threat intelligence enables SOC and IR teams to respond faster to real threats – decreasing the risk of data breaches. www.phishme.com
Qualys is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,200 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications.
Please visit www.qualys.com
Risk-X is a global provider of Advisory, Audit, Forensics, Incident Response and Assurance services. When it comes to security and specialist resources we have real world experience across all market sectors and verticals.
Please visit www.risk-x.co.uk
Telspace Systems' main aim is to make your company or organisation as unattractive to cybercriminals as possible. Services include Web Application Assessments, Attack and Penetration Testing, Infosec Training and consulting.
Please visit www.telspace.co.za
Zenith Systems specialises in QRadar SIEM, SNARE log Collection and Spirion PII/POPI Data Management solutions.
For more information visit: www.zenithsystems.co.za
Soba Vigor specialize in, Advanced Threat Detection, Network Monitoring, DDoS mitigation, Behavioral Analysis and 10G, 40G and 100G network access equipment (Packet Brokers).
We augment Firewalls and Antivirus systems to provide a high level of Network Security.
See more at: www.sobavigor.co.za
Thycotic is the fastest growing provider of Privilege Management solutions that protect an organization’s most valuable assets from cyber-attacks. Thycotic secures privileged account access for 7,500 organizations worldwide. Thycotic’s award winning Privilege Management Security solutions minimize privileged credential risk, limit user privileges, and control applications on endpoints and servers.
See more at: www.thycotic.com
ISC² Gauteng Chapter is the first Chapter to be established in South Africa and in the greater Southern Hemisphere. Our mission is to advance information security in communities situated in and around Gauteng, South Africa, by providing security professionals with the opportunity to share knowledge and educate others.
Visit www.isc2chapter-gauteng.co.za
The IITPSA has a proudly South African heritage of more than half a century of serving the South African body of Information and Communications Technology (ICT) practitioners and professionals. Established in 1957 by a few like-minded 'computer professionals', registered in 1958 as a limited company (then converted to a Section 21 company, now Not-for-Profit Company (NPC)), the IITPSA has grown into a body that is reinventing itself in the twenty first century.
See more at: www.iitpsa.org.za
ITWeb’s Brainstorm is a local monthly magazine for decision-makers and other intelligent people. Brainstorm offers content on burning business issues that is fresh, controversial, independent and valuable.
See more at: www.brainstormmag.co.za.
CareerWeb was launched in 1999 and is the leading ICT job portal that focuses purely on the ICT industry. CareerWeb is commited to providing the best service and value to this specialist niche market. CareerWeb is the career site of sister publication ITWeb. CareerWeb is in a unique position to target ICT professionals. It is the premier career site providing IT professionals with a ‘one-stop shop’ for career opportunities, career and salary advice and CV storage. This makes CareerWeb the perfect place for advertising job vacancies and targeting skilled IT professionals.
See more at: careerweb.co.za.
ITWeb Africa provides the latest news, analysis, features, market and video reports, and insights into the continent's changing telecoms and technology industry.
Visit: www.itwebafrica.com.