NETCB
Nearby computer & electronics services
Mark Shuttleworth Street
The Innovation Centre
0087
NETCB provides solutions for Digital Workspaces, Cyber Security and Hybrid Cloud Computing.
NETCB's solutions focus areas:
Digital Workspaces
Remote Workforce Management
Electronic Records and Document Management
Enterprise Communications and Collaboration
Business Productivity Workflow Management
Universal Communications Archival
Virtual Office Communications
Virtual Desktops and Workspaces
Cyber Security
Threat Prevention
Security Governance and Analytics
Password Management Soluti
, cloud on demand, and rising user expectations are changing . In this new world, high-speed change and customer-facing services reign. A broader operations model is needed for smarter digital operations. Read on to see what's coming.
by design is a concept that places privacy requirements in the design, development, and deployment of products, services and systems. Core elements contain guiding principles for collecting, using, retaining, and disclosing personal information and implementing appropriate security measures to protect that information. The idea is to embed privacy practices into how data is shared and in systems of engagement from the outset rather than trying to bolt on privacy protections after the fact. Greg Clark has more for us in this new blog from Cybersecurity:
ISO 31700 and Privacy by Design: What You Need to Know Privacy by design is a concept that places privacy requirements in the design, development, and deployment of products, services and systems. Core elements contain guiding principles for collecting, using, retaining, and disclosing personal information and implementing appropriate security measures....
With Galaxy’s GTAP+ threat intelligence feed, analysts gain immediate, out-of-the-box detection and response content that’s always on, and always up to date. Check it out now: Cybersecurity
Advanced Threat Research - Intelligent SecOps Threat Research for Business ResilienceTrying to stay on top of the latest threat intelligence feels like drinking from a firehose. Many companies are left with a wealth of information about threats and IOCs, but have little information on where to start, how threats affect their business, or how to...
This case study shows how Content Manager helped the University of Southern Queensland deliver significant cost savings, streamlined working practices, and regulatory compliance. Read the full case study:
In this Reimagining Cyber EXTRA! Podcast episode from by OpenText, hosts Rob Aragao and Stan Wisseman talk about : The Good, The Bad, and The Ugly, and ways to make it harder on attackers. Listen now:
EXTRA! Ransomware: The Good, The Bad, and The Ugly - Reimagining Cyber It’s been a mixed few weeks if you are in the ransomware game. (If you listen to this podcast we presume you are not a cybercriminal, but do get in touch if you are and leave us your full contact details).In this episode Rob and Stan look at the h...
See how to deliver increased visibility of unstructured data through -based, -powered analytics with Voltage File Analysis Suite for Data Discovery:
Data Discovery Tools | SaaS File Analysis | CyberRes Use Data Discovery to analyze, manage, and secure sensitive data, PII and high value data. Part of the SaaS file analysis Suite. Request a demo and learn more here.
Is your software supply chain at risk? This new blog from CyberRes by OpenText details how Fortify solutions can help.
Shoring up the Software Supply Chain – Our New Webinar Shows How Is your software supply chain at risk? Our new AppSec blog details how Fortify by OpenText can help:
Jaguar TCS Racing leverages Micro Focus Vertica, IDOL, and Professional Services for their Formula E race car design and operations...and not just for speed.
Read this 4.5 star review on of Servive Management Automation X (SMAX) in the IT Service Management category from a Senior Solution Architect at Grupo Cimcorp.
This new webinar on March 14 from by OpenText, and partner TriVir, will show how to use , with best practices for onboarding, managing and maintaining a successful governance environment. Register now:
Scaling IGA to Cover the Whole Enterprise : Zero Trust Webinar Series Beyond the capabilities of NetIQ Identity Governance, a successful use of it depends on the teams involved knowing how to onboard, manage and maintain their governance environment. In this webinar, Jim Montgomery will teach attendees how to adopt governance best practices.
Check out this new case study to see how Content Manager & Structured Data Manager combined to deliver this global biopharma company future-ready archiving and records management. Read the full case study:
Find out more about securing the software supply chain with this Fortify unplugged YouTube playlist from by OpenText:
InfoConnect Desktop Pro for and Host Access Management and Security Server (MSS) support full regulatory compliance at this US Federal Government Agency, while improving user productivity.
In this short demo video, 's new capabilities for is introduced. Learn how Galaxy's threat research and threat intelligence feed can be implemented to provide proactive threat monitoring content in your organization.
ArcSight Demos | Part 17: Galaxy & Native Threat Intelligence In this short demo video, we introduce CyberRes Galaxy's new threat intelligence capabilities for ArcSight. Learn how Galaxy's threat research and threat int...
Do you know where your sensitive data resides and how to best protect it? If not, check out Voltage File Analysis Suite:
Just as the software supply chain is an interrelated combination of complex systems, the effort to secure the entire ecosystem requires a multi-disciplinary approach. Companies should bring together teams from software development, operations, legal, human resources, and business to create a holistic approach to producing resilient software. See how Fortify solutions can help:
Creating a Secure Software Supply Chain | Micro Focus learn more about the importance of securing your software supply chain in all stages of the SDLC
On this week's episode of the Reimagining Cyber podcast, hosts Stan Wisseman and Rob Aragao welcomed co-founder of Scamalytics, Dan Wi******er, onto the podcast to discuss how cyber scams are breaking hearts. Get details on how to listen in this new blog from by OpenText:
Reimagining Cyber Podcast: Online Dating and How Cyber Scammers are Breaking Hearts On this week's episode of the Reimagining Cyber podcast, hosts Stan Wisseman and Rob Aragao welcomed co-founder of Scamalytics, Dan Wi******er, onto the podcast to discuss how cyber scams are breaking hearts.
This new white paper from by OpenText explains how the need for both provisioning and governance have merged into “Identity Governance and Administration,” why it is needed, and how your organization can achieve it as an integrated part of your efforts. Download it now:
was named a leader in the latest Omdia Universe, a report published annually by the analysts at Omdia in which leading content services platforms are critiqued and rated on their relative positions in the market. Read more:
More than half of employees surveyed see their workplace technology as outdated, & over 70% of software packages were viewed as outdated. Learn why the time to is now with :
In his second post on Season 9 of the Formula E championship for Jaguar TCS Racing, Chad Lerash looks at the stunning Jaguar I-TYPE 6 race car and announces an upcoming Virtual Garage Tour.
Take a look:
Join this new Virtual User Group meeting on February 15 from by OpenText as experts will review real life lessons learned in adopting ArcSight SOAR into Security Operations, including installation, configuration, and creating playbooks. Register now:
ArcSight SOAR - Journey into Automation During this quarterly technical forum we will review real life lessons learned in adopting SOAR into Security Operations including installation, configuration, and creating playbooks. We will also show you how to access and take advantage of this free product.Agenda:
Despite the alarmist headlines, AI can augment - not merely mimic - human capability. Micro Focus' Achmad Chadran shares some real-life examples.
What are the trends of Computing and for 2023? Satyavathi Divadari, Head of Enterprise Security Architecture at OpenText, shares her thoughts in this exclusive interview with CIO News:
Trends of Cloud Computing and Cyber Security in 2023 - CIO News What are the trends in cloud computing in the post-pandemic area?
This is the largest IT project in AG's history. They have said a fond farewell to the that has served them for many decades with the support of .
Data Loss Prevention and Protection (DLPP) incorporates visibility, protection, automation, and governance to manage risks associated with unstructured data. Learn how DLPP is an essential building block in formalizing Zero Trust in this new blog by Kevin E. Greene.
Protecting Unstructured Data Requires a DLP + P Strategy Data Loss Prevention and Protection (DLPP) incorporates visibility, protection, automation, and governance to manage risks associated with unstructured data. Learn how DLPP is an essential building block in formalizing Zero Trust.
Click here to claim your Sponsored Listing.
Our Story
Founded in 2003, NETCB is the trusted advisor and service provider to a large number of customers in Africa, the Middle East and Europe. NETCB has advised customers, implemented solutions and provided support services to customers in over 15 countries. These are clients that vary in size; from five hundred to thousands of users in size.
Using our unique approach through a combination of on-site and remote support services, as well as the use of modern conferencing technology; a relatively small team of consultants has been able to support some of the biggest name brands across a plethora of sectors.
A key component of our operational methodology is the emphasis on 'best of breed technology', without compromising a customer into a single-vendor direction and subsequently entrapping the customer under such a vendor. Using our extensive knowledge and experience with regard to Open Source Technology (OST) platforms, combined with selected proprietary vendor solutions, we have been able to create Information Technology architecture for customers that is both versatile and flexible, and most notably, capable of staying ahead and avoiding the "Populist Adoption Curve".
We have a selection of Technology Partners, all of whom have been selected through years of interpersonal relationship building and partnership, flexibility in approach to customers and ultimately; that enables us to offer solutions to customers that will not experience 'sudden death', and where the vendor has committed to not end the life of a technology, but to rather reinvigorate, maintain and ensure that the customer can experience a return on investment for the foreseeable future, and not be forced to undergo 'migrations' at a considerable expense on a regular basis.
Category
Contact the business
Telephone
Website
Address
Innovation Centre, The Innovation Hub
Pretoria
0087
20 Alkantrant Road
Pretoria, 0081
We offer comprehensive and innovative Financial Systems and managed ICT Solutions. Emid develops, build, implement and manage secure ICT Solution for our clients.
Glenfield Office Park Oberon Avenue Faerie Glen Pretoria
Pretoria
Integration specialists providing specialised platforms for secure, seamless transfer of data.
Valhalla
Pretoria, 001
Montek Systems SA provides sound, video, and lighting equipment for home, commercial and profession
Unit 102 A (A), Office Park 134 Aramist Avenue Menlyn
Pretoria, 0181
N P & C Cloud Solutions Services PVT LTD
Boardwalk Office Park, Block B, Phase 5, 107 Haymeadow Street
Pretoria, 0018
MyTech Innovations provides learning education to employees, and make training effective.
Elarduspark
Pretoria, 0047
SNS Solutions provides Security, Networking and Solar Solutions to your home or business
Pretoria, 0181
Sasta IT Solutions offers managed IT services, cloud based IT solutions and cyber security services for your business.
689 Hertzog Street, Wonderboom South, 0084
Pretoria, 0186
We specialize in matching you with your IT needs whether it is CCTV solutions, desktop, laptop or IT accessories in this ever changing technology-driven environment for either your...
Lion Bridge Building, 440 441 442 Helen Joseph Street
Pretoria, 0001
Unwanted Computers & Parts buyers, refurbishers, resellers & recyclers
Villebois Office Park, Building 3, Corner De Villebois Mareuil Drive, Jacques St, Moreleta Park
Pretoria, 0044
UHF Passive RFID/NFC/Biometric Facial Technology / Bluetooth / No Key Solutions and Digital Solutions
Pretoria
Pretoria, 46355
An About Us page helps your company make a good first impression, and is critical for building customer trust and loyalty. Which is why we've created this free, easy-to-use tool th...