NETCB

NETCB provides solutions for Digital Workspaces, Cyber Security and Hybrid Cloud Computing.

NETCB's solutions focus areas:

Digital Workspaces

Remote Workforce Management
Electronic Records and Document Management
Enterprise Communications and Collaboration
Business Productivity Workflow Management
Universal Communications Archival
Virtual Office Communications
Virtual Desktops and Workspaces

Cyber Security

Threat Prevention
Security Governance and Analytics
Password Management Soluti

07/03/2023

, cloud on demand, and rising user expectations are changing . In this new world, high-speed change and customer-facing services reign. A broader operations model is needed for smarter digital operations. Read on to see what's coming.

sites.ziftsolutions.com

ISO 31700 and Privacy by Design: What You Need to Know 07/03/2023

by design is a concept that places privacy requirements in the design, development, and deployment of products, services and systems. Core elements contain guiding principles for collecting, using, retaining, and disclosing personal information and implementing appropriate security measures to protect that information. The idea is to embed privacy practices into how data is shared and in systems of engagement from the outset rather than trying to bolt on privacy protections after the fact. Greg Clark has more for us in this new blog from Cybersecurity:

ISO 31700 and Privacy by Design: What You Need to Know Privacy by design is a concept that places privacy requirements in the design, development, and deployment of products, services and systems. Core elements contain guiding principles for collecting, using, retaining, and disclosing personal information and implementing appropriate security measures....

Advanced Threat Research - Intelligent SecOps 06/03/2023

With Galaxy’s GTAP+ threat intelligence feed, analysts gain immediate, out-of-the-box detection and response content that’s always on, and always up to date. Check it out now: Cybersecurity

Advanced Threat Research - Intelligent SecOps Threat Research for Business ResilienceTrying to stay on top of the latest threat intelligence feels like drinking from a firehose. Many companies are left with a wealth of information about threats and IOCs, but have little information on where to start, how threats affect their business, or how to...

03/03/2023

This case study shows how Content Manager helped the University of Southern Queensland deliver significant cost savings, streamlined working practices, and regulatory compliance. Read the full case study:

EXTRA! Ransomware: The Good, The Bad, and The Ugly - Reimagining Cyber 03/03/2023

In this Reimagining Cyber EXTRA! Podcast episode from by OpenText, hosts Rob Aragao and Stan Wisseman talk about : The Good, The Bad, and The Ugly, and ways to make it harder on attackers. Listen now:

EXTRA! Ransomware: The Good, The Bad, and The Ugly - Reimagining Cyber It’s been a mixed few weeks if you are in the ransomware game. (If you listen to this podcast we presume you are not a cybercriminal, but do get in touch if you are and leave us your full contact details).In this episode Rob and Stan look at the h...

Data Discovery Tools | SaaS File Analysis | CyberRes 02/03/2023

See how to deliver increased visibility of unstructured data through -based, -powered analytics with Voltage File Analysis Suite for Data Discovery:

Data Discovery Tools | SaaS File Analysis | CyberRes Use Data Discovery to analyze, manage, and secure sensitive data, PII and high value data. Part of the SaaS file analysis Suite. Request a demo and learn more here.

Shoring up the Software Supply Chain – Our New Webinar Shows How 01/03/2023

Is your software supply chain at risk? This new blog from CyberRes by OpenText details how Fortify solutions can help.

Shoring up the Software Supply Chain – Our New Webinar Shows How Is your software supply chain at risk? Our new AppSec blog details how Fortify by OpenText can help:

01/03/2023

Jaguar TCS Racing leverages Micro Focus Vertica, IDOL, and Professional Services for their Formula E race car design and operations...and not just for speed.

sites.ziftsolutions.com

28/02/2023

Read this 4.5 star review on of Servive Management Automation X (SMAX) in the IT Service Management category from a Senior Solution Architect at Grupo Cimcorp.

sites.ziftsolutions.com

Scaling IGA to Cover the Whole Enterprise : Zero Trust Webinar Series 28/02/2023

This new webinar on March 14 from by OpenText, and partner TriVir, will show how to use , with best practices for onboarding, managing and maintaining a successful governance environment. Register now:

Scaling IGA to Cover the Whole Enterprise : Zero Trust Webinar Series Beyond the capabilities of NetIQ Identity Governance, a successful use of it depends on the teams involved knowing how to onboard, manage and maintain their governance environment. In this webinar, Jim Montgomery will teach attendees how to adopt governance best practices.

27/02/2023

Check out this new case study to see how Content Manager & Structured Data Manager combined to deliver this global biopharma company future-ready archiving and records management. Read the full case study:

sites.ziftsolutions.com

27/02/2023

Find out more about securing the software supply chain with this Fortify unplugged YouTube playlist from by OpenText:

www.youtube.com

24/02/2023

InfoConnect Desktop Pro for and Host Access Management and Security Server (MSS) support full regulatory compliance at this US Federal Government Agency, while improving user productivity.

sites.ziftsolutions.com

ArcSight Demos | Part 17: Galaxy & Native Threat Intelligence 24/02/2023

In this short demo video, 's new capabilities for is introduced. Learn how Galaxy's threat research and threat intelligence feed can be implemented to provide proactive threat monitoring content in your organization.

ArcSight Demos | Part 17: Galaxy & Native Threat Intelligence In this short demo video, we introduce CyberRes Galaxy's new threat intelligence capabilities for ArcSight. Learn how Galaxy's threat research and threat int...

23/02/2023

Do you know where your sensitive data resides and how to best protect it? If not, check out Voltage File Analysis Suite:

www.microfocus.com

Creating a Secure Software Supply Chain | Micro Focus 22/02/2023

Just as the software supply chain is an interrelated combination of complex systems, the effort to secure the entire ecosystem requires a multi-disciplinary approach. Companies should bring together teams from software development, operations, legal, human resources, and business to create a holistic approach to producing resilient software. See how Fortify solutions can help:

Creating a Secure Software Supply Chain | Micro Focus learn more about the importance of securing your software supply chain in all stages of the SDLC

Reimagining Cyber Podcast: Online Dating and How Cyber Scammers are Breaking Hearts 21/02/2023

On this week's episode of the Reimagining Cyber podcast, hosts Stan Wisseman and Rob Aragao welcomed co-founder of Scamalytics, Dan Wi******er, onto the podcast to discuss how cyber scams are breaking hearts. Get details on how to listen in this new blog from by OpenText:

Reimagining Cyber Podcast: Online Dating and How Cyber Scammers are Breaking Hearts On this week's episode of the Reimagining Cyber podcast, hosts Stan Wisseman and Rob Aragao welcomed co-founder of Scamalytics, Dan Wi******er, onto the podcast to discuss how cyber scams are breaking hearts.

20/02/2023

This new white paper from by OpenText explains how the need for both provisioning and governance have merged into “Identity Governance and Administration,” why it is needed, and how your organization can achieve it as an integrated part of your efforts. Download it now:

www.microfocus.com

17/02/2023

was named a leader in the latest Omdia Universe, a report published annually by the analysts at Omdia in which leading content services platforms are critiqued and rated on their relative positions in the market. Read more:

sites.ziftsolutions.com

17/02/2023

More than half of employees surveyed see their workplace technology as outdated, & over 70% of software packages were viewed as outdated. Learn why the time to is now with :

17/02/2023

In his second post on Season 9 of the Formula E championship for Jaguar TCS Racing, Chad Lerash looks at the stunning Jaguar I-TYPE 6 race car and announces an upcoming Virtual Garage Tour.

Take a look:

sites.ziftsolutions.com

ArcSight SOAR - Journey into Automation 17/02/2023

Join this new Virtual User Group meeting on February 15 from by OpenText as experts will review real life lessons learned in adopting ArcSight SOAR into Security Operations, including installation, configuration, and creating playbooks. Register now:

ArcSight SOAR - Journey into Automation During this quarterly technical forum we will review real life lessons learned in adopting SOAR into Security Operations including installation, configuration, and creating playbooks. We will also show you how to access and take advantage of this free product.Agenda:

16/02/2023

Despite the alarmist headlines, AI can augment - not merely mimic - human capability. Micro Focus' Achmad Chadran shares some real-life examples.

sites.ziftsolutions.com

Trends of Cloud Computing and Cyber Security in 2023 - CIO News 16/02/2023

What are the trends of Computing and for 2023? Satyavathi Divadari, Head of Enterprise Security Architecture at OpenText, shares her thoughts in this exclusive interview with CIO News:

Trends of Cloud Computing and Cyber Security in 2023 - CIO News What are the trends in cloud computing in the post-pandemic area?

16/02/2023

This is the largest IT project in AG's history. They have said a fond farewell to the that has served them for many decades with the support of .

sites.ziftsolutions.com

Protecting Unstructured Data Requires a DLP + P Strategy 15/02/2023

Data Loss Prevention and Protection (DLPP) incorporates visibility, protection, automation, and governance to manage risks associated with unstructured data. Learn how DLPP is an essential building block in formalizing Zero Trust in this new blog by Kevin E. Greene.

Protecting Unstructured Data Requires a DLP + P Strategy Data Loss Prevention and Protection (DLPP) incorporates visibility, protection, automation, and governance to manage risks associated with unstructured data. Learn how DLPP is an essential building block in formalizing Zero Trust.

Want your business to be the top-listed Computer & Electronics Service in Pretoria?
Click here to claim your Sponsored Listing.

Our Story

Founded in 2003, NETCB is the trusted advisor and service provider to a large number of customers in Africa, the Middle East and Europe. NETCB has advised customers, implemented solutions and provided support services to customers in over 15 countries. These are clients that vary in size; from five hundred to thousands of users in size.

Using our unique approach through a combination of on-site and remote support services, as well as the use of modern conferencing technology; a relatively small team of consultants has been able to support some of the biggest name brands across a plethora of sectors.

A key component of our operational methodology is the emphasis on 'best of breed technology', without compromising a customer into a single-vendor direction and subsequently entrapping the customer under such a vendor. Using our extensive knowledge and experience with regard to Open Source Technology (OST) platforms, combined with selected proprietary vendor solutions, we have been able to create Information Technology architecture for customers that is both versatile and flexible, and most notably, capable of staying ahead and avoiding the "Populist Adoption Curve".

We have a selection of Technology Partners, all of whom have been selected through years of interpersonal relationship building and partnership, flexibility in approach to customers and ultimately; that enables us to offer solutions to customers that will not experience 'sudden death', and where the vendor has committed to not end the life of a technology, but to rather reinvigorate, maintain and ensure that the customer can experience a return on investment for the foreseeable future, and not be forced to undergo 'migrations' at a considerable expense on a regular basis.

Telephone

Address


Innovation Centre, The Innovation Hub
Pretoria
0087

Other Information Technology Companies in Pretoria (show all)
Emid (Pty) Ltd Emid (Pty) Ltd
20 Alkantrant Road
Pretoria, 0081

We offer comprehensive and innovative Financial Systems and managed ICT Solutions. Emid develops, build, implement and manage secure ICT Solution for our clients.

TegraB2BIntegrations TegraB2BIntegrations
Glenfield Office Park Oberon Avenue Faerie Glen Pretoria
Pretoria

Integration specialists providing specialised platforms for secure, seamless transfer of data.

Montek Systems SA Montek Systems SA
Valhalla
Pretoria, 001

Montek Systems SA provides sound, video, and lighting equipment for home, commercial and profession

NPC Solutions NPC Solutions
Unit 102 A (A), Office Park 134 Aramist Avenue Menlyn
Pretoria, 0181

N P & C Cloud Solutions Services PVT LTD

MyTech Innovations MyTech Innovations
Boardwalk Office Park, Block B, Phase 5, 107 Haymeadow Street
Pretoria, 0018

MyTech Innovations provides learning education to employees, and make training effective.

SNS Solutions SNS Solutions
Elarduspark
Pretoria, 0047

SNS Solutions provides Security, Networking and Solar Solutions to your home or business

Sasta It Solutions Sasta It Solutions
Pretoria, 0181

Sasta IT Solutions offers managed IT services, cloud based IT solutions and cyber security services for your business.

UNA Technologies UNA Technologies
Montana
Pretoria

We are the technology company

BN-IT BN-IT
689 Hertzog Street, Wonderboom South, 0084
Pretoria, 0186

We specialize in matching you with your IT needs whether it is CCTV solutions, desktop, laptop or IT accessories in this ever changing technology-driven environment for either your...

GLITTSza GLITTSza
Lion Bridge Building, 440 441 442 Helen Joseph Street
Pretoria, 0001

Unwanted Computers & Parts buyers, refurbishers, resellers & recyclers

RFDigi RFDigi
Villebois Office Park, Building 3, Corner De Villebois Mareuil Drive, Jacques St, Moreleta Park
Pretoria, 0044

UHF Passive RFID/NFC/Biometric Facial Technology / Bluetooth / No Key Solutions and Digital Solutions

WEND,Y WEND,Y
Pretoria
Pretoria, 46355

An About Us page helps your company make a good first impression, and is critical for building customer trust and loyalty. Which is why we've created this free, easy-to-use tool th...